CN106255107A - Router identification authentication method based on wireless linguistic context and terminal unit - Google Patents

Router identification authentication method based on wireless linguistic context and terminal unit Download PDF

Info

Publication number
CN106255107A
CN106255107A CN201610615791.8A CN201610615791A CN106255107A CN 106255107 A CN106255107 A CN 106255107A CN 201610615791 A CN201610615791 A CN 201610615791A CN 106255107 A CN106255107 A CN 106255107A
Authority
CN
China
Prior art keywords
network information
security
wireless
router
security strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610615791.8A
Other languages
Chinese (zh)
Inventor
程国锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kunteng Changlian Technology Co Ltd
Original Assignee
Beijing Kunteng Changlian Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kunteng Changlian Technology Co Ltd filed Critical Beijing Kunteng Changlian Technology Co Ltd
Priority to CN201610615791.8A priority Critical patent/CN106255107A/en
Publication of CN106255107A publication Critical patent/CN106255107A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a kind of router identification authentication method based on wireless linguistic context and terminal unit, wherein method includes: collect the radio network information of router under the wireless linguistic context of periphery;Set security strategy, determine security dimension parameter according to security strategy and radio network information, with different detection models, the network information is detected based on security dimension parameter, and output detections result;According to security strategy, testing result is analyzed, to assess the safety of router.The present invention, by differentiating the degree of depth of router identification, avoids the fishing trap of assailant, improves user's level of security in wireless network environment, it is to avoid information leakage, prevents economic loss, improves security performance.

Description

Router identification authentication method based on wireless linguistic context and terminal unit
Technical field
The invention belongs to mobile Internet security fields, specifically, the present invention relates to a kind of road based on wireless linguistic context By device identity identifying method and terminal unit.
Background technology
Growing along with radio network technique, traditional access in radio is increasingly confined to IT operation enterprise and fixing The access of facility, and in daily life, people are also main based on wireless access way.It can be said that wireless network exists Occupying very important status in the live and work that people are usual, the people of today can not leave wireless network, people Life be also increasingly dependent on wireless network.Meanwhile, along with the increase of wireless network traffic, wireless network carries Increasing private information, becomes hacker and the object of lawless person's attack, and the potential safety hazard of wireless communication is the brightest Aobvious.
In existing wireless attack means, phishing attack is relatively conventional a kind of mode.In the manner, assailant By forging false wifi hotspot, induction user radio connects, and then eavesdrops the network transmission process of user, causes The private information of user is revealed, and safety and economy to user bring greater impact.
Why phishing attack is so universal, because which is simple and easy to do, due to existing operating system mainly Identify the identity accessing hotspot according to SSID (service set), and the SSID of hotspot to be user can arbitrarily set Fixed, therefore, assailant without wanting special instrument and complicated technology, can realize the camouflage to target focus. The most notably, the system of present most of terminal units is all built-in with disconnection reconnecting mechanism, for being user-friendly to experience Purpose, operating system can remember title and the password of the focus that user connected, when feelings wireless network disconnecting occur During condition, system detects the focus of this title automatically, upon this detection can Auto-reconnect, and, these operations be all system with It is automatically performed on backstage in the case of the unknown of family, it is therefore intended that facilitate user, improves the experience of user, but be also Lawless person and assailant provide convenience, and they pretend to be the focus under normal safe environment, induction visitor by setting SSID Family connects the focus of their camouflage, thus completes the purpose of rogue attacks, brings the biggest potential safety hazard and loss to client.
For the problems referred to above, have been proposed that some solutions at present, such as, outside SSID, add focus MAC ground Location (physical address) is as the strengthening measure of identification, but unfortunately, the SSID of MAC Address belongs to revise easily Identity, so this solution the most fundamentally solves this technical problem.
Summary of the invention
The present invention is directed to the disadvantages mentioned above of existing mode, propose a kind of router identification qualification side based on wireless linguistic context Method and terminal unit, be prone to camouflage in order to solve the identification information of the wireless router that prior art exists, and causes illegal Molecule is by pretending the focus of wireless router, and induction client connects the focus of their camouflage, thus completes the mesh of rogue attacks , thus the problem bringing bigger potential safety hazard and economic loss to client.
Embodiments of the invention are according to an aspect, it is provided that a kind of router identification qualification side based on wireless linguistic context Method, including:
Collect the radio network information of router under the wireless linguistic context of periphery;
Set security strategy, determine security dimension parameter according to security strategy and radio network information, tie up based on safety The network information is detected by degree parameter with different detection models, and output detections result;
According to security strategy, testing result is analyzed, to assess the safety of router.
Preferably, radio network information includes: SSID, MAC and RSSI etc..
Preferably, the radio network information collected is organized in XML structure mode and stores.
Preferably, detection model is corresponding with the network information, the different network informations or a combination thereof correspondence one detection mould Type.
Preferably, according to security dimension parameter and the testing result of detection model, it may be judged whether need to carry out higher level Detection.
Preferably, when testing result is less than predetermined secure threshold, then need to carry out the detection of higher level;
When testing result is higher than the secure threshold set, if security strategy requires, then need to carry out higher level Detection, if security strategy no requirement (NR), then without carrying out the detection of higher level.
Preferably, when testing result is analyzed, enter with testing result with the parameter in the default security linguistic context that prestores Row comparative analysis.
Preferably, the method for comparative analysis is the method being analyzed based on similarity of character string.
Preferably, the method for comparative analysis is to utilize NCD algorithm to the method comparing analysis.
It addition, the invention also discloses a kind of terminal unit, comprising:
Collection module, in order to collect the radio network information of router under the wireless linguistic context of periphery;
According to security strategy and radio network information, detection module, in order to set security strategy, determines that security dimension is joined Number, detects the network information with different detection models based on security dimension parameter, and output detections result;
Analysis and assessment module, in order to according to security strategy, to be analyzed testing result, to assess the safety of router Property.
In embodiments of the invention, the information such as SSID and MAC Address of not being simply based on router self is carried out Identity criterion, but judge according to the wireless network environment residing for router, owing to the network environment of router sets Meter is to the factor of a lot of every aspects, so for assailant, being far from arranging of simple modification self can forge, It is greatly improved the difficulty of attack.Additionally the present invention is by differentiating the degree of depth of router identification, avoids the fishing of assailant Fish-trap, improve user's level of security in wireless network environment, it is to avoid information leakage, prevents economic loss, carries High security performance.
Aspect and advantage that the present invention adds will part be given in the following description, and these will become from the following description Obtain substantially, or recognized by the practice of the present invention.
Accompanying drawing explanation
The present invention above-mentioned and/or that add aspect and advantage will become from the following description of the accompanying drawings of embodiments Substantially with easy to understand, wherein:
Fig. 1 is the schematic flow sheet of present invention router identification based on a wireless linguistic context authentication method wherein embodiment;
Detailed description of the invention
Embodiments of the invention are described below in detail, and the example of described embodiment is shown in the drawings, the most from start to finish Same or similar label represents same or similar element or has the element of same or like function.Below with reference to attached The embodiment that figure describes is exemplary, is only used for explaining the present invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative used herein " ", " Individual ", " described " and " being somebody's turn to do " may also comprise plural form.It is to be further understood that use in the description of the present invention arranges Diction " including " refers to there is described feature, integer, step, operation, element and/or assembly, but it is not excluded that existence or adds Other features one or more, integer, step, operation, element, assembly and/or their group.It should be understood that when we claim unit Part is " connected " or during " coupled " to another element, and it can be directly connected or coupled to other elements, or can also exist Intermediary element.Additionally, " connection " used herein or " coupling " can include wireless connections or wireless couple.Used herein arrange Diction "and/or" includes that one or more list the whole of item or any cell being associated combines with whole.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, and all terms used herein (include technology art Language and scientific terminology), have with the those of ordinary skill in art of the present invention be commonly understood by identical meaning.Also should Be understood by, those terms defined in such as general dictionary, it should be understood that have with in the context of prior art The meaning that meaning is consistent, and unless by specific definitions as here, otherwise will not use idealization or the most formal implication Explain.
Those skilled in the art of the present technique are appreciated that " terminal unit " used herein above, " terminal unit equipment " both wrapped Including the equipment of wireless signal receiver, it only possesses the equipment of wireless signal receiver of non-emissive ability, include again receiving and Launching the equipment of hardware, it has the reception that on bidirectional communication link, can carry out two-way communication and the equipment launching hardware. This equipment may include that honeycomb or other communication equipments, and it has single line display or multi-line display or the most The honeycomb of multi-line display or other communication equipments;PCS (Personal Communications Service, personal communication system System), it can process with combine voice, data, fax and/or its communication ability;PDA(Personal Digital Assistant, personal digital assistant), it can include that the access of radio frequency receiver, pager, the Internet/intranet, network are clear Look at device, notepad, calendar and/or GPS (Global Positioning System, global positioning system) receptor;Conventional knee joint Mo(u)ld top half and/or palmtop computer or other equipment, it has and/or includes conventional laptop and/or the palm of radio frequency receiver Laptop computer or other equipment." terminal " used herein above, " terminal unit " can be portable, can transport, be arranged on In the vehicles (aviation, sea-freight and/or land), or it is suitable for and/or is configured at local runtime, and/or with distribution Form, any other position operating in the earth and/or space is run." terminal " used herein above, " terminal unit " also may be used To be communication terminal, access terminals, music/video playback terminal, such as, can be PDA, MID (Mobile Internet Device, mobile internet device) and/or there is the mobile phone of music/video playing function, it is also possible to be intelligent television, The equipment such as Set Top Box.
Below according to accompanying drawing 1, by embodiment, disclosed by the invention router identification of based on wireless linguistic context is discussed in detail Authentication method.
In embodiments of the invention, terminal unit gathers the wireless messages of router, this wireless communication under the wireless linguistic context of periphery Breath includes but are not limited to the key messages such as SSID, MAC and RSSI (the signal intensity instruction of acceptance).
The above-mentioned wireless messages collected organized in the way of xml (XML (extensible Markup Language)) collects and stores, making network Global Information structuring, organizes in the way of xml collection here and stores, and has description simple, direct advantage, the most also Can organize in the way of selecting other and store, the most not do concrete restriction.
Then, carry out model monitoring, first set security strategy, then according to this security strategy and collection and store Radio network information determine current security dimension parameter, then with this security dimension parameter with different detection models to net Network information detects, and the result of output detections.It should be noted that detection model is by security dimension parameter here Information carries out building, and the information of this security dimension depends on the key parameter of network environment and the safe plan of setting Slightly.Come illustratively detection model and the safety detection carried out thereof below by a specific embodiment, and this model is used To radio network information and data be not intended as the restriction of the present invention.
First, based on the SSID information collected, constructing safety detection model 1, detailed process is:
The SSID collected is expressed as n character string, then according to the order of letter (Chinese character is according to sound sequence) is arranged Sequence, completes execution character string concatenation after sequence, forms long character string S1.Under the default security ambient parameter that will prestore SSID also extract, according to the representation of SSID under this environment, be similarly formed long character string S0.Then it is right to need The similarity of character string S0 and character string S1 compares and weighs.
According to the expression way of network environment, when weighing similarity between two network environments, generally use character string similar The computational methods of degree, conventional computational methods have local sensitivity Hash LSH (Locality Sensitive Hashing), normalizing Change compression distance NCD (Normalized Compressed Distance), Perturbed algorithms (Rounding Algorithm) and The methods such as editing distance (Edit Distance), what we used here is NCD algorithm, and this algorithm is that one can be used to weigh The method of information content similarity degree, the method applies and achieves good effect in multiple fields, as gene test, Anthelmintic and Malware identification etc..It addition, NCD algorithm has java standard library support, it is easy to accomplish, comparatively ideal result can be obtained.
NCD is defined as follows:
N C D ( m , n ) = C o m p r e s s ( m + n ) - m i n ( C o m p r e s s ( m ) , C o m p r e s s ( n ) ) m a x ( C o m p r e s s ( m ) , C o m p r e s s ( n ) )
Wherein, in m+n "+" expression character string attended operation, after Compress (m) represents that character string m is compressed Length, compression function herein uses zlib (providing the data base of data compression).It is obvious that NCD (m, n) sign m and n Between the degree that overlaps of content, and m, n content coincidence degree is the highest, then we can say that both is the most similar, therefore can use (m n) weighs m, the similarity between n to NCD.Typically, if NCD (m, n)=1, then it is considered that m, n are identical.
In general, if the wireless linguistic context of the acquiescence of router is Pi, the current wireless linguistic context of router is Pj, then both Behavior similarity is:
S i m ( i , j ) = N C D ( P i , P j ) = C o m p r e s s ( P i + P j ) - min ( C o m p r e s s ( P i ) , C o m p r e s s ( P j ) ) max ( C o m p r e s s ( P i ) , C o m p r e s s ( P j ) )
(i j) features the similarity degree evaluating behavior of node (set) i and node (set) j to behavior similarity Sim.
Character string S0 and S1 are substituted into these computational methods and just can draw testing result, detected into the detection of output identity Result R1, determines a need for detecting further according to the comparing result of testing result with detection threshold value, and detection threshold value is in safety Strategy presets.If less than the secure threshold set, then needing to detect further, perform next step operation, if high In secure threshold, but security strategy requirement, it is also desirable to perform next step operation.
2., below, based on the SSID collected and mac address information, construct security model 2.
The process of tectonic model is by character to being expressed as ssid+mac of SSID and MAC of each focus that collect String, then according to lexicographic order (Chinese character is according to sound sequence) is ranked up, completes execution character string concatenation after sequence, forms one Individual long character string S1, extracts SSID and MAC in default security ambient parameter, in the manner described above, is similarly formed one Individual long character string S0.
Then referring to the NCD algorithm in step 1, current wireless linguistic context and the similarity giving tacit consent to wireless linguistic context are weighed Amount.
Detect into output identity testing result R2, determined whether according to the comparing result of testing result with detection threshold value Detection further, detection threshold value is needed to preset in security strategy.If less than the secure threshold set, then needed into one Step detection, performs next step operation, if above secure threshold, but security strategy requirement, it is also desirable to perform next step operation.
The most further, based on the SSID collected, mac address information and RSSI information, construct security model 3.
The process of tectonic model is to being expressed as ssid+mac+ by SSID, MAC and RSSI of each focus of collecting The character string of rssi, then according to lexicographic order (Chinese character is according to sound sequence) is ranked up, completes execution character string splicing after sequence Operation, forms long character string S1, is extracted by SSID, MAC and the RSSI in default security ambient parameter, according to above-mentioned Mode, is similarly formed long character string S0.
Then referring to the NCD algorithm in step 1, current wireless linguistic context and the similarity giving tacit consent to wireless linguistic context are weighed Amount.
Detect into output identity testing result R3.
More than detection is only distance explanation, does not do concrete restriction, collects according to such as above detection only SSID, mac address information and RSSI information are made that the detection of Three Estate, here can also be by different kind of information, to the greatest extent The infomation detection of heart multiple combination or the infomation detection of higher level.
Finally, according to the security strategy set, and the result come detected by each step, consider, to currently Can the identity state of router provides a final qualification result, to assess whether this router has safety, carry out nothing Line connects.
According to above-mentioned testing result, general for, according to the Stringency of the security strategy used, can be divided into as follows Several situations, brief analysis is as follows.
Situation one: when the safe class that security strategy requires is higher, mainly with R3 as judgment basis, be referred to R2, can ignore for R1 result.
Situation two, when the moderate safe class that security strategy requires, mainly with R2 as judgment basis, is referred to R1 And R3, provide final conclusion after carrying out synthetic determination.
Situation three: when the safe class ratio of security strategy requirement is time relatively low, mainly with R1 as judgment basis, be referred to R2, R3.
For professional person, it is also possible to according to this model and the algorithm of detection Process Design oneself and Application way, at tool Body environment reaches best effect, thus router identification is analyzed more comprehensively, the most do not do concrete restriction.
It addition, the invention also discloses a kind of terminal unit using said method, this equipment at least includes with lower part:
Collection module, in order to collect the radio network information of router under the wireless linguistic context of periphery;
Detection module, in order to set security strategy, determines safe dimension according to this security strategy and this radio network information Degree parameter, detects this network information with different detection models based on described security dimension parameter, and output detections knot Really;
Analysis and assessment module, in order to according to this security strategy, to be analyzed this testing result, to assess described router Safety.
The above is only the some embodiments of the present invention, it is noted that for the ordinary skill people of the art For Yuan, under the premise without departing from the principles of the invention, it is also possible to make some improvements and modifications, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (10)

1. a router identification authentication method based on wireless linguistic context, comprises the steps:
Collect the radio network information of router under the wireless linguistic context of periphery;
Set security strategy, determine security dimension parameter according to described security strategy and described radio network information, based on institute State security dimension parameter with different detection models, the described network information to be detected, and output detections result;
According to described security strategy, described testing result is analyzed, to assess the safety of described router.
2. the method for claim 1, it is characterised in that described radio network information includes: SSID, MAC and RSSI etc..
3. the method for claim 1, it is characterised in that by the described radio network information collected with XML structure Mode is organized and stores.
4. the method for claim 1, it is characterised in that described detection model is corresponding with the described network information is different The network information or the corresponding different detection model of a combination thereof.
5. the method for claim 1, it is characterised in that according to described security dimension parameter and the inspection of described detection model Survey result, it may be judged whether need to carry out the detection of higher level.
6. method as claimed in claim 5, it is characterised in that
When described testing result is less than predetermined secure threshold, then need to carry out the detection of higher level;
When described testing result is higher than the secure threshold set, if security strategy requires, then need to carry out higher level Detection, if described security strategy no requirement (NR), then without carrying out the detection of higher level.
7. the either method as described in claim 1-6, it is characterised in that
When described testing result is analyzed, compare with described testing result with the parameter in the default security linguistic context that prestores Relatively analyze.
8. method as claimed in claim 7, it is characterised in that the method for described comparative analysis is to come based on similarity of character string The method being analyzed.
9. method as claimed in claim 8, it is characterised in that the method for described comparative analysis is to utilize NCD algorithm to carry out The method of comparative analysis.
10. a terminal unit, it is characterised in that including:
Collection module, in order to collect the radio network information of router under the wireless linguistic context of periphery;
Detection module, in order to set security strategy, determines safe dimension according to described security strategy and described radio network information Degree parameter, detects the described network information with different detection models based on described security dimension parameter, and output detections Result;
Analysis and assessment module, in order to according to described security strategy, to be analyzed described testing result, to assess described router Safety.
CN201610615791.8A 2016-07-28 2016-07-28 Router identification authentication method based on wireless linguistic context and terminal unit Pending CN106255107A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610615791.8A CN106255107A (en) 2016-07-28 2016-07-28 Router identification authentication method based on wireless linguistic context and terminal unit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610615791.8A CN106255107A (en) 2016-07-28 2016-07-28 Router identification authentication method based on wireless linguistic context and terminal unit

Publications (1)

Publication Number Publication Date
CN106255107A true CN106255107A (en) 2016-12-21

Family

ID=57605957

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610615791.8A Pending CN106255107A (en) 2016-07-28 2016-07-28 Router identification authentication method based on wireless linguistic context and terminal unit

Country Status (1)

Country Link
CN (1) CN106255107A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106792702A (en) * 2017-01-23 2017-05-31 北京坤腾畅联科技有限公司 Router identification detection method and terminal device based on unusual route
CN112399416A (en) * 2020-12-02 2021-02-23 中国联合网络通信集团有限公司 Access method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101277229A (en) * 2008-05-26 2008-10-01 杭州华三通信技术有限公司 Method for detecting illegality equipment and wireless client terminal
CN104852894A (en) * 2014-12-10 2015-08-19 北京奇虎科技有限公司 Wireless message monitor detecting method, system and central control server
CN105472621A (en) * 2015-12-03 2016-04-06 西北大学 Pseudo AP detection method based on RSSI

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101277229A (en) * 2008-05-26 2008-10-01 杭州华三通信技术有限公司 Method for detecting illegality equipment and wireless client terminal
CN104852894A (en) * 2014-12-10 2015-08-19 北京奇虎科技有限公司 Wireless message monitor detecting method, system and central control server
CN105472621A (en) * 2015-12-03 2016-04-06 西北大学 Pseudo AP detection method based on RSSI

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
王强: "WLAN接入安全检测评估模型的研究", 《中国优秀硕士学位论文全文数据库》 *
郑跃明: "无线局域网安全检测系统研究", 《中国优秀硕士学位论文全文数据库》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106792702A (en) * 2017-01-23 2017-05-31 北京坤腾畅联科技有限公司 Router identification detection method and terminal device based on unusual route
CN112399416A (en) * 2020-12-02 2021-02-23 中国联合网络通信集团有限公司 Access method and device

Similar Documents

Publication Publication Date Title
CN107852410B (en) Dissect rogue access point
CN112055024B (en) Authority verification method and device, storage medium and electronic equipment
Cunche et al. Linking wireless devices using information contained in Wi-Fi probe requests
Cunche et al. I know who you will meet this evening! linking wireless devices using wi-fi probe requests
CN109451182B (en) Detection method and device for fraud telephone
US8331904B2 (en) Apparatus and a security node for use in determining security attacks
CN100418114C (en) Mobile communication appts. monitoring appts. monitoring system, monitoring method, onotoring program, and computer-readable recording medium contg. monitoring program
CN105447388B (en) A kind of Android malicious code detection system based on weight and method
CN104639907A (en) Intelligent security and protection method and system based on mobile terminal
CN104284337A (en) Base station detection method and system
CN108198303A (en) A kind of intelligent door lock control method, device and system
CN106211157A (en) Base station reorientation method and base station redirection device
CN106204984A (en) A kind of burglary-resisting installation based on wireless signal and method
KR20090038189A (en) Apparatus and method for managing terminal users
Wang et al. On optimality of myopic sensing policy with imperfect sensing in multi-channel opportunistic access
CN109658311A (en) A kind of data analysis system for serving E-Government
CN106255107A (en) Router identification authentication method based on wireless linguistic context and terminal unit
CN109189780A (en) The storage of ideology and politics material and inquiry management system and method based on big data
CN109871211A (en) Information displaying method and device
CN114363069A (en) Data management system for guaranteeing information network security of colleges and universities
Rusca et al. Privacy‐preserving WiFi‐based crowd monitoring
CN116846610A (en) Network security threat detection method, device, equipment and medium
CN106060826A (en) Base station redirection method and base station redirection device
CN201514632U (en) Portable multifunctional multi-channel acquisition identity identification device based on 3G network
CN114338187B (en) Terminal safety detection method and device based on decision tree

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20161221

WD01 Invention patent application deemed withdrawn after publication