CN105306530B - A method of using Wi-Fi label monitoring objective objects - Google Patents

A method of using Wi-Fi label monitoring objective objects Download PDF

Info

Publication number
CN105306530B
CN105306530B CN201510591357.6A CN201510591357A CN105306530B CN 105306530 B CN105306530 B CN 105306530B CN 201510591357 A CN201510591357 A CN 201510591357A CN 105306530 B CN105306530 B CN 105306530B
Authority
CN
China
Prior art keywords
label
random number
monitoring device
monitoring
ssid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510591357.6A
Other languages
Chinese (zh)
Other versions
CN105306530A (en
Inventor
刘中志
吴裔
农革
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Yat Sen University
SYSU CMU Shunde International Joint Research Institute
Original Assignee
Sun Yat Sen University
SYSU CMU Shunde International Joint Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sun Yat Sen University, SYSU CMU Shunde International Joint Research Institute filed Critical Sun Yat Sen University
Priority to CN201510591357.6A priority Critical patent/CN105306530B/en
Publication of CN105306530A publication Critical patent/CN105306530A/en
Application granted granted Critical
Publication of CN105306530B publication Critical patent/CN105306530B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0008General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Artificial Intelligence (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The present invention relates to a kind of methods using Wi Fi label monitoring objective objects, include the following steps:S101:Label L broadcasts the SSID of itself in its signal cover;S102:Monitoring device M asks to log in label L by personal login mode;S103:Label L and monitoring device M carries out 4-Way Handshake, and is verified to the wildcard p of the personal login mode of monitoring device M inputs;If being proved to be successful, the ANonce and SNonce generated in handshake procedure is recorded;If authentication failed, redirects and execute step S106;S104:Label L and monitoring device M is pressed generates an identical random number sequence R and respectively in the copy R1 and R2 for locally preserving R according to ANonce, SNonce and wildcard p;S105:Random number in the random number and R2 that scan simultaneously is compared to confirm presence and the true and false of label L by the random number in label L broadcast (sites) in turn R1, the random number of monitoring device M periodic scanning labels L broadcast;S106:Terminate.

Description

A method of using Wi-Fi label monitoring objective objects
Technical field
The present invention relates to wireless communication fields, more particularly, to a kind of side using Wi-Fi label monitoring objective objects Method.
Background technology
The problems such as losing for real-life article and is stolen, the prior art mainly use bluetooth, RFID and Wi-Fi Etc. agreements carry out monitoring objective object, the scheme of the prior art is specific as follows:
(1)A kind of personal belongings monitoring system based on Bluetooth of mobile phone, wherein monitoring device periodically with mounted on target pair Judge target object whether in monitoring range as upper Bluetooth label progress handshake communication.
(2)A kind of article monitoring method and device based on bluetooth, wherein be mounted on target object on Bluetooth label with Monitoring device is mutually distinguishable by predefined unique pairing code.Monitoring device periodically carries out handshake communication with Bluetooth label and comes Judge target object whether in monitoring range.Monitoring device can monitor multiple objects simultaneously.
(3)A kind of article loss preventing device using passive RFID tags, wherein monitoring device periodic scanning is attached to target pair Judge target object whether in monitoring range as upper passive RFID tags.
(4)It is a kind of to prevent the method and system that mobile terminal is lost using Wi-Fi module, wherein equipped with Wi-Fi module Monitoring device respectively t1 and t2 (>T1) moment obtains the signal strength s1 and s2 of same hot spot.Assuming that hot spot [t1, t2) Position remains unchanged in time, if s1/s2 is less than pre-set threshold value, monitoring device judgement target object is beyond monitoring range and opens Dynamic alert program.
The defect of above scheme is:The effective communication distance of bluetooth and passive RFID tags is usually no more than 10 meters, prison It is small to control range;Monitoring device, which needs periodically to establish point-to-point communication with Bluetooth label during long-term monitoring, to be connect to confirm label It whether there is, electricity expense is big;The sampling accuracy of Wi-Fi Hotspot signal strength is easily affected by environment, and feasibility is low.
Invention content
To solve the above problems, the present invention proposes a kind of method using Wi-Fi tag monitoring control target objects, this method tool There is the advantages of monitoring range is big, electricity expense is small, safe and good compatibility.
To realize the above goal of the invention, the technical solution adopted is that:
A method of using Wi-Fi label monitoring objective objects, passing through the monitoring device M prisons equipped with Wi-Fi module The label L on target object is controlled to realize the monitoring to target object, is included the following steps:
S101:Label L broadcasts the SSID of itself in its signal cover;
S102:Monitoring device M asks to log in label L by personal login mode;
S103:Label L and monitoring device M carries out 4-Way Handshake, and to the pre- of the personal login mode of monitoring device M inputs Shared key p is verified;If being proved to be successful, the ANonce and SNonce generated in handshake procedure is recorded;If authentication failed, It then redirects and executes step S106;
S104:Label L and monitoring device M is identical random according to ANonce, SNonce and wildcard p generations one Number Sequence R and the copy R1 and R2 for preserving R in local respectively;
S105:Random number in label L broadcast (sites) in turn R1, the random number of monitoring device M periodic scanning labels L broadcast simultaneously will Random number in the random number and R2 that scan is compared to confirm presence and the true and false of label L;
S106:Terminate.
In said program, random number sequence is generated using ANonce, SNonce and wildcard, to only Wi- Fi labels and can generate identical random number sequence with the monitoring device of its success 4-Way Handshake, safety in this way It is higher;And it is not necessary to modify Wi-Fi agreements, and method can be deployed in existing Wi-Fi equipment by user when specifically used, Its compatibility is preferably;And confirm since monitoring device accesses Wi-Fi labels in initial monitor stages by personal login mode Its true and false, thereafter the random number of monitoring device periodic scanning Wi-Fi tag broadcasts carry out presence and the true and false of long-term monitoring label, In the process, monitoring device is not necessarily to re-establish communication connection with label, therefore the electricity expense needed for it substantially reduces;Together When since the communication distance of Wi-Fi labels is up to hundred meters, so the monitoring range of method provided by the invention and prior art phase Than having obtained larger extension.
Preferably, in step S105, the step of random number in label L broadcast (sites) in turn R1, is specific as follows:
S201:Label L cyclically chooses subsequent r1s of the random number x in R1, and random number x, which is initially in R1, is located at right end Random number;
S202:Label L is by random number r1 insertion SSID and broadcasts the SSID;
S203:Label L judges whether to continue to broadcast next random number;If so, x is updated to r1 and is redirected to execute step Rapid S201;
S204:It returns.
Preferably, in step S202, label L can be embedded in random number r1 in SSID as follows:R1 is embedded in SSID Left end, or by r1 be embedded in SSID right end.
Preferably, in step S105, the presence of monitoring device M confirmation labels L and the detailed process of the true and false are as follows:
S301:The SSID embedded with random number of monitoring device M scanning label L broadcast and therefrom extraction random number r1;
S302:Monitoring device M recycled in such a way that label L cycle chooses subsequent r1s of the random number x in R1 selection with Machine number the y subsequent r2 in R2, random number y are initially the random number for being located at right end in R2;
S303:Monitoring device M judges whether r1 is equal to r2;If it is not, then monitoring device M starts alert program and redirects execution Step S305;
S304:Monitoring device M judges whether to continue to scan on the random number of label L broadcast;If so, y is updated to r2 simultaneously It redirects and executes step S301;
S305:It returns.
Preferably, in step S105, the presence of monitoring device M confirmation labels L and the detailed process of the true and false are as follows:
S401:The SSID embedded with random number r1 of monitoring device M scanning label L broadcast simultaneously extracts r1 from SSID;
S402:Monitoring device M chooses d random number by certain way from R2 and forms a subsequence W;
S403:Monitoring device M judges whether r1 is equal with some random number in W;If it is not, then monitoring device M starts report Alert program simultaneously redirects execution step S405;
S404:Monitoring device M judges whether to continue to scan on the random number of label L broadcast;If so, redirecting execution step S401;
S405:Terminate.
Preferably, in step S104, the detailed process for generating random number sequence R is as follows:Label L and monitoring device M will be pre- The character code of shared key p obtains an integer m with ANonce and SNonce phases Calais, is then calculated by middle square method M is the random number sequence R of random seed.
Compared with prior art, the beneficial effects of the invention are as follows:
(1)It is safe:Random number sequence is generated using ANonce, SNonce and wildcard, to only Wi- Fi labels and the monitoring device for succeeding 4-Way Handshake with it can generate identical random number sequence.
(2)Good compatibility:It is not necessary to modify Wi-Fi agreements, and the method can be deployed in existing Wi-Fi equipment.
(3)Electricity expense is small:Monitoring device accesses Wi-Fi labels come really in initial monitor stages by personal login mode Recognize its true and false, hereafter, the random numbers of monitoring device periodic scanning Wi-Fi tag broadcasts come the presence of long-term monitoring label with it is true Puppet, in the process, monitoring device are not necessarily to re-establish communication connection with label.
(4)Range is wide:The communication distance of Wi-Fi labels is up to hundred meters.
Description of the drawings
Fig. 1 is the system construction drawing of the present invention;
Fig. 2 is the flow chart of method provided by the invention;
Fig. 3 is the 4-Way Handshake sequence diagram of WPA-PSK/WPA2-PSK people's login mode;
Fig. 4 is the flow chart that the Wi-Fi mark cycles of the present invention broadcast the specific implementation mode of random number sequence;
Fig. 5 be the present invention monitoring device periodic scanning Wi-Fi tag broadcasts random number come confirm label presence and The flow chart of the specific implementation mode of the true and false;
Fig. 6 be the present invention monitoring device periodic scanning Wi-Fi tag broadcasts random number come confirm label presence and The flow chart of another specific implementation mode of the true and false;
Fig. 7 is the exemplary plot that the Wi-Fi mark cycles of the present invention broadcast the specific implementation mode of random number sequence;
Fig. 8 be the present invention monitoring device periodic scanning Wi-Fi tag broadcasts random number come confirm label presence and The exemplary plot of the specific implementation mode of the true and false.
Specific implementation mode
The attached figures are only used for illustrative purposes and cannot be understood as limitating the patent;
Below in conjunction with drawings and examples, the present invention is further elaborated.
Embodiment 1
Fig. 1 is the system construction drawing of the present invention, and wherein Wi-Fi labels are mounted on target object, and monitoring device M is one The smart machines such as mobile phone, tablet or laptop equipped with Wi-Fi communication modules.
As shown in Fig. 2, monitoring device M is using a kind of specific implementation mode S10 of Wi-Fi label L monitoring objective objects:
S101:Label L broadcasts the SSID of itself in its signal cover;
S102:Monitoring device M submits logging request with personal login mode to label L;
S103:Label L and monitoring device M carries out 4-Way Handshake is to verify the wildcard p that monitoring device M is inputted It is no correct(Fig. 3);If so, label L and monitoring device M are respectively in local record random number ANonce and SNonce;If it is not, then It redirects and executes step S106;
S104:Label L and monitoring device M is using same random digit generation method according to ANonce, SNonce and pre- total Key p is enjoyed to generate an identical random number sequence R and preserve the copy R1 and R2 of R in local respectively;
In the step, label L and monitoring device M can be by the character codes of wildcard p and ANonce and SNonce phases Calais obtains an integer m, and the random number sequence R using m as random seed is then calculated by middle square method.
S105:Label L and monitoring device M difference implementation procedures S20 and S30(Or S40);
S106:Terminate.
Wi-Fi labels L is initially in R1 in the copy R1 for locally preserving random number sequence R, random number x positioned at right end Random number.As shown in figure 4, the specific implementation mode S20 that label L broadcasts R1 by SSID is:
S201:Label L cyclically chooses subsequent r1s of the random number x in R1 from left to right;
S202:Label L is by random number r1 insertion SSID and broadcasts the SSID;
In the step, label L can be embedded in random number r1 in SSID as follows:1)R1 is embedded in the left end of SSID, Or 2)R1 is embedded in the right end of SSID.
In the step, if label L can broadcast multiple SSID simultaneously, random number r1 can be also embedded in the 2nd SSID by label L And broadcast the 2nd SSID.
S203:Label L judges whether to continue to broadcast next random number;If so, x is updated to r1 and is redirected to execute step Rapid S201;
S204:It returns.
Monitoring device M is initially in R2 in the copy R2 for locally preserving random number sequence R, random number y positioned at right end Random number.As shown in figure 5, the random number of monitoring device M scanning Wi-Fi labels L broadcast confirms presence and the true and false of label L Specific implementation mode S30 is:
S301:The SSID embedded with random number of monitoring device M scanning label L broadcast and therefrom extraction random number r1;
In the step, monitoring device M extracts r1 according to the method for label L embedded random numbers in S202.
S302:Monitoring device M cyclically chooses subsequent r2s of the random number y in R2 from left to right;
S303:Monitoring device M judges whether r1 is equal to r2;If it is not, then monitoring device M starts alert program and redirects execution Step S305;
S304:Monitoring device M judges whether to continue to scan on the random number of label L broadcast;If so, y is updated to r2 simultaneously It redirects and executes step S301;
S305:It returns.
As shown in fig. 6, the monitoring device M random numbers broadcasted according to Wi-Fi labels L confirm presence and the true and false of label L Another specific implementation mode S40 be:
S401:The SSID embedded with random number of monitoring device M scanning label L broadcast and therefrom extraction random number r1;
In the step, random number is embedded in the method for SSID to extract r1 by monitoring device M according to label L in S202.
S402:Monitoring device M cyclically chooses subsequent r2s of the random number y in R2 from left to right;
S403:D-1 random number being located in r2 and R2 on the right side of r2 is formed a position continuously sub- sequence by monitoring device M Arrange W;
S404:Monitoring device M judges some random number z whether r1 is equal in W;If it is not, then monitoring device M starts alarm Program simultaneously redirects execution step S406;
S405:Monitoring device M judges whether to continue to scan on the random number of label L broadcast;If so, y is updated to z and is jumped Turn to execute step S401;
S406:It returns.
Monitoring device M can stop the random number of scanning Wi-Fi labels L broadcast in step S304 or S405.Thereafter, monitoring is set Standby M can access label L to restart monitoring objective object again by personal login mode at any time.At this point, label L Implementation procedure S10 updates random seed and random number sequence.
For ease of understanding, process S20 and S40 is exemplified below.
Known monitoring device M and label L is calculated the same random number sequence R and respectively in the copy for locally preserving R R1 and R2, wherein R=R1=R2={ 3,6,5,2 }.
As shown in fig. 7, the system time of label L is split as continuous fixed length time slot.In the i-th time slot, label L is to periphery The SSID of (i monitoring devices Mod n) a random number of broadcast embedded with R1, wherein n are the number of random number in R.Label L weights Random number of the execution above process until its R1 that goes off the air again.
As shown in figure 8, random number y is initially 2, monitoring device M is scanned the SSID of label L by intervals.In T0 Moment, monitoring device M extracted from the SSID of label L r1=3 and in R2 choose since r2=3 three random numbers 3, 6,5 } W is formed.Since r1 is equal with the first random number in W, monitoring device M judgements label L is true and y is updated to 3. Similarly, monitoring device M extracts r1=6 at the T1 moment.Since r1 is equal with the first random number in W, monitoring device M Judgement label L is true and y is updated to 6.At the T2 moment, monitoring device M extract r1=2 and by its in W element 5,2, 3 } it is compared.Since r1 is equal with second random number in W, monitoring device M judgements label L is true and y is updated to 2. Monitoring device M repeats the random number that the above process is broadcasted until its termination scanning label L.
Obviously, the above embodiment of the present invention be only to clearly illustrate example of the present invention, and not be pair The restriction of embodiments of the present invention.For those of ordinary skill in the art, may be used also on the basis of the above description To make other variations or changes in different ways.There is no necessity and possibility to exhaust all the enbodiments.It is all this All any modification, equivalent and improvement etc., should be included in the claims in the present invention made by within the spirit and principle of invention Protection domain within.

Claims (5)

1. a kind of method using Wi-Fi label monitoring objective objects passes through the monitoring device M monitoring equipped with Wi-Fi module Label L on target object realizes the monitoring to target object, it is characterised in that:Include the following steps:
S101:Label L broadcasts the SSID of itself in its signal cover;
S102:Monitoring device M asks to log in label L by personal login mode;
S103:Label L and monitoring device M carries out 4-Way Handshake, and the pre-share of the personal login mode to monitoring device M inputs Key p is verified;If being proved to be successful, the ANonce and SNonce generated in handshake procedure is recorded;If authentication failed is jumped Turn to execute step S106;
S104:Label L and monitoring device M generates an identical random number sequence according to ANonce, SNonce and wildcard p Arrange R and respectively in the copy R1 and R2 for locally preserving R;
S105:Random number in label L broadcast (sites) in turn R1, the random number of monitoring device M periodic scanning labels L broadcast simultaneously will scannings To random number and R2 in random number be compared to confirm presence and the true and false of label L;
S106:Terminate.
2. the method according to claim 1 using Wi-Fi label monitoring objective objects, it is characterised in that:Step S105 In, the step of random number in label L broadcast (sites) in turn R1, is specific as follows:
S201:Label L cyclically chooses subsequent r1s of the random number x in R1, random number x be initially in R1 positioned at right end with Machine number;
S202:Label L is by random number r1 insertion SSID and broadcasts the SSID;
S203:Label L judges whether to continue to broadcast next random number;If so, x is updated to r1 and redirects execution step S201;
S204:It returns.
3. the method according to claim 2 using Wi-Fi label monitoring objective objects, it is characterised in that:Step S202 In, label L can be embedded in random number r1 in SSID as follows:R1 is embedded in the left end of SSID, or r1 is embedded in SSID Right end.
4. the method according to claim 2 using Wi-Fi label monitoring objective objects, it is characterised in that:Step S105 In, the presence of monitoring device M confirmation labels L and the detailed process of the true and false are as follows:
S301:The SSID embedded with random number of monitoring device M scanning label L broadcast and therefrom extraction random number r1;
S302:Monitoring device M is recycled in such a way that label L cycles choose subsequent r1s of the random number x in R1 and is chosen random number y Subsequent r2 in R2, random number y are initially the random number for being located at right end in R2;
S303:Monitoring device M judges whether r1 is equal to r2;If it is not, then monitoring device M starts alert program and redirects execution step S305;
S304:Monitoring device M judges whether to continue to scan on the random number of label L broadcast;If so, y is updated to r2 and is redirected Execute step S301;
S305:It returns.
5. the method for using Wi-Fi label monitoring objective objects according to claim 1 ~ 4 any one of them, it is characterised in that: In step S104, the detailed process for generating random number sequence R is as follows:Label L and monitoring device M is by the character of wildcard p Coding obtains an integer m with ANonce and SNonce phases Calais, is then calculated using m as random seed by middle square method Random number sequence R.
CN201510591357.6A 2015-09-16 2015-09-16 A method of using Wi-Fi label monitoring objective objects Active CN105306530B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510591357.6A CN105306530B (en) 2015-09-16 2015-09-16 A method of using Wi-Fi label monitoring objective objects

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510591357.6A CN105306530B (en) 2015-09-16 2015-09-16 A method of using Wi-Fi label monitoring objective objects

Publications (2)

Publication Number Publication Date
CN105306530A CN105306530A (en) 2016-02-03
CN105306530B true CN105306530B (en) 2018-10-12

Family

ID=55203273

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510591357.6A Active CN105306530B (en) 2015-09-16 2015-09-16 A method of using Wi-Fi label monitoring objective objects

Country Status (1)

Country Link
CN (1) CN105306530B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115102726B (en) * 2022-06-07 2024-04-05 东风柳州汽车有限公司 Dual authentication matching method, device, system and equipment for remote key

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4112188B2 (en) * 2001-03-09 2008-07-02 シャープ株式会社 Data storage device
US9823342B2 (en) * 2010-02-09 2017-11-21 Aeroscout, Ltd. System and method for mobile monitoring of non-associated tags
CN203368520U (en) * 2013-06-25 2013-12-25 惠州Tcl家电集团有限公司 Household electrical appliance monitoring equipment and system

Also Published As

Publication number Publication date
CN105306530A (en) 2016-02-03

Similar Documents

Publication Publication Date Title
US8898783B2 (en) Detecting malicious device
CN105101200B (en) A kind of pseudo-base station recognition methods, device and terminal device
US9686676B2 (en) Method, apparatus, and computer program product for a server controlled device wakeup
CN103491569A (en) Method, apparatus, and computer program product for wireless short-range communication disconnection
US20160119320A1 (en) Method and system for secure deployment and use of bluetooth low energy beacons and other network devices
CN107094293A (en) A kind of device and method for obtaining WiFi terminal real MAC address
JP5002669B2 (en) Communication equipment
KR102424142B1 (en) Method and apparatus for certificating information related payment in a mobile communication system
JP4988472B2 (en) Wireless communication method, wireless communication system, and wireless communication apparatus
KR101465522B1 (en) Method and System for Executing IoT Service with Shortrange Communication Tag
KR20110031752A (en) Method and apparatus for detecting sybil attack node using localization information and hash chain in ubiquitous sensor networks
CN105357181B (en) A kind of method of multiple terminals monitoring Wi-Fi labels
JP2017168909A (en) Radio communication program, method, and device
CN107027121A (en) A kind of WiFi network safety access method and device
US20220408263A1 (en) Access control system and method
CN109803456B (en) Method and device for requesting to recover connection
CN105306530B (en) A method of using Wi-Fi label monitoring objective objects
CN105657857B (en) Wireless network connecting method and device
Moradi et al. A distributed method based on mobile agent to detect Sybil attacks in wireless sensor networks
CN106792519A (en) A kind of mobile terminal method for tracing and device
CN102843690B (en) Wireless access point-based penetration test system and test method thereof
US9698983B2 (en) Method and apparatus for disabling algorithms in a device
CN106982449A (en) A kind of network collocating method of video camera
US10311594B2 (en) Method for verifying positions of a plurality of monitoring devices
ES2780177T3 (en) Authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant