CN109803264A - The method and apparatus for identifying wireless invasive - Google Patents

The method and apparatus for identifying wireless invasive Download PDF

Info

Publication number
CN109803264A
CN109803264A CN201811580402.8A CN201811580402A CN109803264A CN 109803264 A CN109803264 A CN 109803264A CN 201811580402 A CN201811580402 A CN 201811580402A CN 109803264 A CN109803264 A CN 109803264A
Authority
CN
China
Prior art keywords
hotspot
message
address
mac1
length
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811580402.8A
Other languages
Chinese (zh)
Other versions
CN109803264B (en
Inventor
张怀广
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qianxin Technology Co Ltd
Original Assignee
Beijing Qianxin Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qianxin Technology Co Ltd filed Critical Beijing Qianxin Technology Co Ltd
Priority to CN201811580402.8A priority Critical patent/CN109803264B/en
Publication of CN109803264A publication Critical patent/CN109803264A/en
Application granted granted Critical
Publication of CN109803264B publication Critical patent/CN109803264B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

The embodiment of the present invention provides a kind of method and apparatus for identifying wireless invasive.The described method includes: the data on monitoring wireless network, obtain the MAC Address of the hotspot carried in air message, are denoted as MAC1;The data on current particular network are monitored, the message that MAC Address is MAC1 ± n is obtained, MAC1 ± n is denoted as MAC2, wherein n is positive integer;By address be MAC2 message length and address be MAC1 the length of air message match;When successful match, confirm that the hotspot has accessed current particular network.The embodiment of the present invention passes through the message length of matching hotspot side and the message length of particular network side, it can accurately identify whether hotspot is linked into particular network, to take counter-measure to the hotspot of invasion, and then ensure the operational safety of particular network.

Description

The method and apparatus for identifying wireless invasive
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of method and apparatus for identifying wireless invasive.
Background technique
Present wireless router, carry-on WIFI, mobile phone build hot spot and cause huge hidden danger to the network security of enterprise. Employee is easy to that modes create a shared hot spot, the safe energy of these hot spots by the way that carry-on WIFI or mobile phone be shared etc. Power is weaker, it is easy to allow illegal user to access corporate intranet, bring about great losses to enterprise.Existing many WIFI are produced safely Product modes, the existing hot spot in discovery company such as can scan by WIFI, but not can confirm that whether the hot spot has accessed company Intranet.
Summary of the invention
For prior art problem, the embodiment of the present invention provides a kind of method and apparatus for identifying wireless invasive.
In a first aspect, the embodiment of the present invention provides a kind of method for identifying wireless invasive, which comprises
Data on monitoring wireless network obtain the MAC Address of the hotspot carried in air message, are denoted as MAC1;
The data on current particular network are monitored, the message that MAC Address is MAC1 ± n is obtained, MAC1 ± n is denoted as MAC2, wherein n is positive integer;
By address be MAC2 message length and address be MAC1 the length of air message match;
When successful match, confirm that the hotspot has accessed current particular network.
Second aspect, the embodiment of the present invention provide a kind of device for identifying wireless invasive, and described device includes:
First acquisition unit obtains the hotspot carried in air message for the data on monitoring wireless network MAC Address is denoted as MAC1;
Second acquisition unit obtains the message that MAC Address is MAC1 ± n for monitoring the data on current particular network, MAC1 ± n is denoted as MAC2, wherein n is positive integer;
Matching unit, the length progress for the air message that the length for the message for being MAC2 by address and address are MAC1 Matching;
Confirmation unit, for confirming that the hotspot has accessed current particular network when successful match.
The third aspect, the embodiment of the present invention also provide a kind of electronic equipment, including memory, processor and are stored in On reservoir and the computer program that can run on a processor, the processor realize above-mentioned first aspect when executing described program The method of offer.
Fourth aspect, the embodiment of the present invention also provide a kind of non-transient computer readable storage medium, are stored thereon with meter Calculation machine program realizes the method that above-mentioned first aspect provides when described program is executed by processor.
The embodiment of the present invention passes through the message length of matching hotspot side and the message length of particular network side, Neng Gouzhun Really whether identification hotspot is linked into particular network, to take counter-measure to the hotspot of invasion, and then ensures special Determine the operational safety of network.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Bright some embodiments for those of ordinary skill in the art without creative efforts, can be with root Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow diagram of the method for the identification wireless invasive that one embodiment of the invention provides;
Fig. 2 is the structural schematic diagram of the device for the identification wireless invasive that one embodiment of the invention provides;
Fig. 3 is the structural schematic diagram for the electronic equipment that one embodiment of the invention provides.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Fig. 1 shows a kind of flow diagram of method for identifying wireless invasive provided in an embodiment of the present invention.
As shown in Figure 1, it is provided in an embodiment of the present invention identification wireless invasive method specifically includes the following steps:
Data on S11, monitoring wireless network obtain the MAC Address of the hotspot carried in air message, are denoted as MAC1;
Specifically, either carry-on WIFI or wireless router, use on the different port on the same product MAC Address is continuously that last potential difference of MAC Address is not little in other words.
Wireless data is first listened to, the MAC Address of hotspot is obtained, is denoted as MAC1.
Data on S12, the current particular network of monitoring, obtain the message that MAC Address is MAC1 ± n, MAC1 ± n are denoted as MAC2, wherein n is positive integer;
Specifically, monitoring network on wired networks, check whether there is MAC Address be MAC1 ± n (n can be 1, 2,4,8 etc.) message, this MAC Address are denoted as MAC2.If so, can tentatively judge that address connects for the hotspot of MAC1 Corporate wired network is entered.
The present invention identifies the MAC Address of hot spot using WIFI audiomonitor, while utilizing inner-mesh network message monitoring equipment Monitor network message, if it find that have with the very similar message of hot spot MAC Address, it was initially believed that this hot spot accessed it is interior Net.
S13, the length of air message that length and the address of the message for being MAC2 by address are MAC1 match;
Specifically, the information such as the length of WIFI message and Intranet association message are persistently compared, can further confirm that hot spot Whether Intranet is accessed.
S14, when successful match, confirm that the hotspot has accessed current particular network.
The present invention can identify whether hotspot has accessed specified network.It identifies hotspot and has accessed ad hoc networks After network, administrator can be handled the data of hotspot and hotspot according to the strategy of network management, ensure company The network operation and network security.
The embodiment of the present invention passes through the message length of matching hotspot side and the message length of particular network side, Neng Gouzhun Really whether identification hotspot is linked into particular network, to take counter-measure to the hotspot of invasion, and then ensures special Determine the operational safety of network.
On the basis of the above embodiments, S13 is specifically included:
The length for the message that the address for obtaining current particular network side is MAC2, is denoted as (Len1, len2 ..., lenN);
The length for the air message that the address for obtaining hotspot side is MAC1, be denoted as (AP_len1, AP_len2 ..., AP_lenM);
By address be MAC1 air message length be MAC2 with address the length of message carried out according to special ratios Comparison;
When (Len1, len2 ..., the lenN) of special ratios has pair in (AP_len1, AP_len2 ..., AP_lenM) When the value answered, successful match.
Specifically, the length for the message that persistently monitored address is MAC2 on wired networks, be denoted as (Len1, len2 ..., LenN), while in the air message length of monitoring hotspot, it is denoted as (AP_len1, AP_len2 ..., AP_lenM).According to Certain formula compares the message length on the message length and cable network of hotspot side, if meeting certain ratio (AP_len1, AP_len2 ..., the AP_lenM) of example has corresponding value in (Len1, len2 ..., lenN), then can be confirmed This hotspot has accessed company Intranet.
On the basis of the above embodiments, before S11, the method also includes:
Scanning obtains hotspot present in current particular network.
Specifically, existing many WIFI safety products such as can scan at the modes by WIFI, existing in discovery company Hot spot, but existing product not can confirm that the hot spot of discovery, and which has accessed company Intranet, which does not access company Intranet.
On the basis of the above embodiments, before S14, the method also includes:
According to the management strategy at current specific network, the data of the hotspot and hotspot that illegally access are prevented Imperial processing.
Specifically, it identifies after hotspot accessed particular network, administrator can be right according to the strategy of network management The data of hotspot and hotspot are handled, and ensure the network operation and network security of company.
Fig. 2 shows a kind of structural schematic diagrams for the device for identifying wireless invasive provided in an embodiment of the present invention.
As shown in Fig. 2, the device of identification wireless invasive provided in an embodiment of the present invention includes first acquisition unit 11, second Acquiring unit 12, matching unit 13 and confirmation unit 14, in which:
The first acquisition unit 11 carries wireless for the data on monitoring wireless network in acquisition air message The MAC Address of hot spot, is denoted as MAC1;
Specifically, either carry-on WIFI or wireless router, use on the different port on the same product MAC Address is continuously that last potential difference of MAC Address is not little in other words.
Wireless data is first listened to, the MAC Address of hotspot is obtained, is denoted as MAC1.
The second acquisition unit 12, for monitoring the data on current particular network, acquisition MAC Address is MAC1 ± n Message, MAC1 ± n is denoted as MAC2, wherein n is positive integer;
Specifically, monitoring network on wired networks, check whether there is MAC Address be MAC1 ± n (n can be 1, 2,4,8 etc.) message, this MAC Address are denoted as MAC2.If so, can tentatively judge that address connects for the hotspot of MAC1 Corporate wired network is entered.
The present invention identifies the MAC Address of hot spot using WIFI audiomonitor, while utilizing inner-mesh network message monitoring equipment Monitor network message, if it find that have with the very similar message of hot spot MAC Address, it was initially believed that this hot spot accessed it is interior Net.
The matching unit 13, the length for the air message that the length for the message for being MAC2 by address and address are MAC1 Degree is matched;
Specifically, the information such as the length of WIFI message and Intranet association message are persistently compared, can further confirm that hot spot Whether Intranet is accessed.
The confirmation unit 14, for confirming that the hotspot has accessed current particular network when successful match.
The present invention can identify whether hotspot has accessed specified network.It identifies hotspot and has accessed ad hoc networks After network, administrator can be handled the data of hotspot and hotspot according to the strategy of network management, ensure company The network operation and network security.
The embodiment of the present invention passes through the message length of matching hotspot side and the message length of particular network side, Neng Gouzhun Really whether identification hotspot is linked into particular network, to take counter-measure to the hotspot of invasion, and then ensures special Determine the operational safety of network.
On the basis of the above embodiments, the matching unit 13 includes:
First obtains module, and the length for the message that the address for obtaining current particular network side is MAC2 is denoted as (Len1,len2…,lenN);
Second obtains module, and the length for the air message that the address for obtaining hotspot side is MAC1 is denoted as (AP_ len1,AP_len2,…,AP_lenM);
Contrast module, for the air message for being MAC1 by address length and address be MAC2 message length according to Special ratios compare;
Judgment module, for (Len1, len2 ..., the lenN) when special ratios in (AP_len1, AP_len2 ..., AP_ When having corresponding value in lenM), successful match.
Specifically, the length for the message that persistently monitored address is MAC2 on wired networks, be denoted as (Len1, len2 ..., LenN), while in the air message length of monitoring hotspot, it is denoted as (AP_len1, AP_len2 ..., AP_lenM).According to Certain formula compares the message length on the message length and cable network of hotspot side, if meeting certain ratio (AP_len1, AP_len2 ..., the AP_lenM) of example has corresponding value in (Len1, len2 ..., lenN), then can be confirmed This hotspot has accessed company Intranet.
On the basis of the above embodiments, described device further include:
Scan module, before the data on monitoring wireless network, scanning is obtained present in current particular network Hotspot.
Specifically, existing many WIFI safety products such as can scan at the modes by WIFI, existing in discovery company Hot spot, but existing product not can confirm that the hot spot of discovery, and which has accessed company Intranet, which does not access company Intranet.
On the basis of the above embodiments, described device further include:
Processing unit, for after confirmation hotspot has accessed current particular network, according to current specific network Management strategy is on the defensive processing to the data of the hotspot and hotspot that illegally access.
According to the management strategy at current specific network, the data of the hotspot and hotspot that illegally access are prevented Imperial processing.
Specifically, it identifies after hotspot accessed particular network, administrator can be right according to the strategy of network management The data of hotspot and hotspot are handled, and ensure the network operation and network security of company.
The embodiment of the present invention also provides a kind of electronic equipment, including memory, processor and storage are on a memory and can The computer program run on a processor, the processor realize the method such as Fig. 1 when executing described program.
Fig. 3 shows the structural schematic diagram of the electronic equipment of one embodiment of the invention offer.
As shown in figure 3, electronic equipment provided in an embodiment of the present invention include memory 21, processor 22, bus 23 and It is stored in the computer program that can be run on memory 21 and on processor 22.Wherein, the memory 21, processor 22 are logical It crosses the bus 23 and completes mutual communication.
The processor 22 is used to call the program instruction in the memory 21, realizes when executing described program as schemed 1 method.
For example, the processor realizes following method when executing described program:
Data on monitoring wireless network obtain the MAC Address of the hotspot carried in air message, are denoted as MAC1;
The data on current particular network are monitored, the message that MAC Address is MAC1 ± n is obtained, MAC1 ± n is denoted as MAC2, wherein n is positive integer;
By address be MAC2 message length and address be MAC1 the length of air message match;
When successful match, confirm that the hotspot has accessed current particular network.
Electronic equipment provided in an embodiment of the present invention, by the message length and the particular network side that match hotspot side Message length, can accurately identify whether hotspot is linked into particular network, to take reply to the hotspot of invasion Measure, and then ensure the operational safety of particular network.
The embodiment of the present invention also provides a kind of non-transient computer readable storage medium, and meter is stored on the storage medium Calculation machine program is realized when described program is executed by processor such as the step of Fig. 1.
For example, the processor realizes following method when executing described program:
Data on monitoring wireless network obtain the MAC Address of the hotspot carried in air message, are denoted as MAC1;
The data on current particular network are monitored, the message that MAC Address is MAC1 ± n is obtained, MAC1 ± n is denoted as MAC2, wherein n is positive integer;
By address be MAC2 message length and address be MAC1 the length of air message match;
When successful match, confirm that the hotspot has accessed current particular network.
Non-transient computer readable storage medium provided in an embodiment of the present invention is long by the message for matching hotspot side The message length of degree and particular network side, can accurately identify whether hotspot is linked into particular network, thus to invasion Hotspot takes counter-measure, and then ensures the operational safety of particular network.
One embodiment of the invention discloses a kind of computer program product, and the computer program product is non-temporary including being stored in Computer program on state computer readable storage medium, the computer program include program instruction, when described program instructs When being computer-executed, computer is able to carry out method provided by above-mentioned each method embodiment, for example,
Data on monitoring wireless network obtain the MAC Address of the hotspot carried in air message, are denoted as MAC1;
The data on current particular network are monitored, the message that MAC Address is MAC1 ± n is obtained, MAC1 ± n is denoted as MAC2, wherein n is positive integer;
By address be MAC2 message length and address be MAC1 the length of air message match;
When successful match, confirm that the hotspot has accessed current particular network.
Functional module in the embodiment of the present invention can pass through hardware processor (hardware processor) Lai Shixian Related function module, the embodiment of the present invention repeat no more.
The apparatus embodiments described above are merely exemplary, wherein described, unit can as illustrated by the separation member It is physically separated with being or may not be, component shown as a unit may or may not be physics list Member, it can it is in one place, or may be distributed over multiple network units.It can be selected according to the actual needs In some or all of the modules achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creativeness Labour in the case where, it can understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on Stating technical solution, substantially the part that contributes to existing technology can be embodied in the form of software products in other words, should Computer software product may be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including several fingers It enables and using so that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation Method described in certain parts of example or embodiment.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features; And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and Range.

Claims (10)

1. a kind of method for identifying wireless invasive, which is characterized in that the described method includes:
Data on monitoring wireless network obtain the MAC Address of the hotspot carried in air message, are denoted as MAC1;
The data on current particular network are monitored, the message that MAC Address is MAC1 ± n is obtained, MAC1 ± n is denoted as MAC2, In, n is positive integer;
By address be MAC2 message length and address be MAC1 the length of air message match;
When successful match, confirm that the hotspot has accessed current particular network.
2. the method according to claim 1, wherein the length of the message for being MAC2 by address is with address The length of the air message of MAC1 carries out matching
The length for the message that the address for obtaining current particular network side is MAC2, is denoted as (Len1, len2 ..., lenN);
The length for the air message that the address for obtaining hotspot side is MAC1, is denoted as (AP_len1, AP_len2 ..., AP_ lenM);
By address be MAC1 air message length be MAC2 with address the length of message compared according to special ratios;
When (Len1, len2 ..., the lenN) of special ratios have in (AP_len1, AP_len2 ..., AP_lenM) it is corresponding When value, successful match.
3. the method according to claim 1, wherein before the data on monitoring wireless network, the method Further include:
Scanning obtains hotspot present in current particular network.
4. the method according to claim 1, wherein confirmation hotspot accessed current particular network it Afterwards, the method also includes:
According to the management strategy at current specific network, it is on the defensive place to the data of the hotspot and hotspot that illegally access Reason.
5. a kind of device for identifying wireless invasive, which is characterized in that described device includes:
First acquisition unit, for the data on monitoring wireless network, with obtaining the MAC of the hotspot carried in air message Location is denoted as MAC1;
Second acquisition unit, for monitoring the data on current particular network, the message that acquisition MAC Address is MAC1 ± n will MAC1 ± n is denoted as MAC2, wherein n is positive integer;
Matching unit, the length progress for the air message that the length for the message for being MAC2 by address and address are MAC1 Match;
Confirmation unit, for confirming that the hotspot has accessed current particular network when successful match.
6. device according to claim 5, which is characterized in that the matching unit includes:
First obtains module, the length for the message that the address for obtaining current particular network side is MAC2, be denoted as (Len1, len2…,lenN);
Second obtains module, the length for the air message that the address for obtaining hotspot side is MAC1, be denoted as (AP_len1, AP_len2,…,AP_lenM);
Contrast module, the length for the message that length and address for the air message for being MAC1 by address are MAC2 is according to specific Ratio compares;
Judgment module, for (Len1, len2 ..., the lenN) when special ratios at (AP_len1, AP_len2 ..., AP_lenM) In when having corresponding value, successful match.
7. device according to claim 5, which is characterized in that described device further include:
Scan module, before the data on monitoring wireless network, scanning obtains wireless present in current particular network Hot spot.
8. device according to claim 5, which is characterized in that described device further include:
Processing unit, for after confirmation hotspot has accessed current particular network, according to the management at current specific network Strategy is on the defensive processing to the data of the hotspot and hotspot that illegally access.
9. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor Machine program, which is characterized in that realized when the processor executes described program and identify nothing as described in any one of Claims 1-4 The step of method of line invasion.
10. a kind of non-transient computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer The step of method that wireless invasive is identified as described in any one of Claims 1-4 is realized when program is executed by processor.
CN201811580402.8A 2018-12-24 2018-12-24 Method and device for recognizing wireless intrusion Active CN109803264B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811580402.8A CN109803264B (en) 2018-12-24 2018-12-24 Method and device for recognizing wireless intrusion

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811580402.8A CN109803264B (en) 2018-12-24 2018-12-24 Method and device for recognizing wireless intrusion

Publications (2)

Publication Number Publication Date
CN109803264A true CN109803264A (en) 2019-05-24
CN109803264B CN109803264B (en) 2022-04-29

Family

ID=66557440

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811580402.8A Active CN109803264B (en) 2018-12-24 2018-12-24 Method and device for recognizing wireless intrusion

Country Status (1)

Country Link
CN (1) CN109803264B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112153631A (en) * 2019-06-28 2020-12-29 北京奇虎科技有限公司 Method and device for identifying illegal intrusion and router
CN112437439A (en) * 2020-11-11 2021-03-02 周金华 Hot spot sharing method based on artificial intelligence and feature analysis and big data cloud platform

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070286143A1 (en) * 2003-07-28 2007-12-13 Olson Timothy S Method, apparatus, and software product for detecting rogue access points in a wireless network
CN104125568A (en) * 2014-08-11 2014-10-29 醴陵恒茂电子科技有限公司 Wireless access point safe authentication method and system
CN104869576A (en) * 2014-02-24 2015-08-26 北京奇虎科技有限公司 Identification method and device of wireless hot spot
CN105554740A (en) * 2015-12-31 2016-05-04 北京神州绿盟信息安全科技股份有限公司 Method and apparatus for identifying wireless hotspots, and device
CN106507363A (en) * 2017-01-06 2017-03-15 北京锐云通信息技术有限公司 A kind of method for finding fishing access point
CN106658756A (en) * 2016-12-13 2017-05-10 浙江大华技术股份有限公司 Method and device for recognizing connection between terminal device and hotspot
CN107995626A (en) * 2017-12-04 2018-05-04 锐捷网络股份有限公司 A kind of method and apparatus for identifying WIFI signal security class in WLAN

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070286143A1 (en) * 2003-07-28 2007-12-13 Olson Timothy S Method, apparatus, and software product for detecting rogue access points in a wireless network
CN104869576A (en) * 2014-02-24 2015-08-26 北京奇虎科技有限公司 Identification method and device of wireless hot spot
CN104125568A (en) * 2014-08-11 2014-10-29 醴陵恒茂电子科技有限公司 Wireless access point safe authentication method and system
CN105554740A (en) * 2015-12-31 2016-05-04 北京神州绿盟信息安全科技股份有限公司 Method and apparatus for identifying wireless hotspots, and device
CN106658756A (en) * 2016-12-13 2017-05-10 浙江大华技术股份有限公司 Method and device for recognizing connection between terminal device and hotspot
CN106507363A (en) * 2017-01-06 2017-03-15 北京锐云通信息技术有限公司 A kind of method for finding fishing access point
CN107995626A (en) * 2017-12-04 2018-05-04 锐捷网络股份有限公司 A kind of method and apparatus for identifying WIFI signal security class in WLAN

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112153631A (en) * 2019-06-28 2020-12-29 北京奇虎科技有限公司 Method and device for identifying illegal intrusion and router
CN112437439A (en) * 2020-11-11 2021-03-02 周金华 Hot spot sharing method based on artificial intelligence and feature analysis and big data cloud platform
CN112437439B (en) * 2020-11-11 2021-08-31 曙光星云信息技术(北京)有限公司 Hot spot sharing method based on artificial intelligence and feature analysis and big data cloud platform

Also Published As

Publication number Publication date
CN109803264B (en) 2022-04-29

Similar Documents

Publication Publication Date Title
CN103313429B (en) A kind of processing method identifying forgery WIFI hot spot
CN106851632A (en) A kind of smart machine accesses the method and device of WLAN
CN109803264A (en) The method and apparatus for identifying wireless invasive
CN103888480B (en) Network information security authentication method and cloud device based on cloud monitoring
CN105306414A (en) Port vulnerability detection method, device and system
CN103856957A (en) Method and device for detecting counterfeit AP in wireless local area network
CN105100048B (en) WiFi network secure authentication method, server, client terminal device and system
CN106302104A (en) A kind of customer relationship recognition methods and device
CN106156915A (en) A kind of wireless Work attendance method, Apparatus and system
CN107483381A (en) The monitoring method and device of interlock account
CN107135149A (en) A kind of method and apparatus for being used to recommend social user
CN105468981B (en) Plug-in security scanning means and scan method based on loophole identification technology
CN106961683A (en) A kind of method, system and finder AP for detecting rogue AP
CN107248995A (en) Account verification method and device
WO2018072733A1 (en) Webpage security check method and device
CN107295519A (en) A kind of wireless network access method, apparatus and system
CN105873180B (en) Method and apparatus for setting up wireless connection
CN108430063A (en) A kind of method and apparatus for monitoring ARP deceptions in WLAN
CN106131786B (en) The acquisition methods and device of additional population data
CN108307526A (en) Equipment connection method and Related product
CN106302345A (en) A kind of terminal authentication method and device
CN114615066A (en) Target path determination method and device
CN107995650B (en) Method and device for acquiring neighbor cell identifier
CN106375259A (en) Same-user account identification method and apparatus
CN111930653B (en) Remote distribution use method and device of USB (universal serial bus) equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Room 332, 3 / F, Building 102, 28 xinjiekouwei street, Xicheng District, Beijing 100088

Applicant after: Qianxin Technology Group Co.,Ltd.

Address before: 100015 15, 17 floor 1701-26, 3 building, 10 Jiuxianqiao Road, Chaoyang District, Beijing.

Applicant before: BEIJING QIANXIN TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant