CN109803264A - The method and apparatus for identifying wireless invasive - Google Patents
The method and apparatus for identifying wireless invasive Download PDFInfo
- Publication number
- CN109803264A CN109803264A CN201811580402.8A CN201811580402A CN109803264A CN 109803264 A CN109803264 A CN 109803264A CN 201811580402 A CN201811580402 A CN 201811580402A CN 109803264 A CN109803264 A CN 109803264A
- Authority
- CN
- China
- Prior art keywords
- hotspot
- message
- address
- mac1
- length
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
The embodiment of the present invention provides a kind of method and apparatus for identifying wireless invasive.The described method includes: the data on monitoring wireless network, obtain the MAC Address of the hotspot carried in air message, are denoted as MAC1;The data on current particular network are monitored, the message that MAC Address is MAC1 ± n is obtained, MAC1 ± n is denoted as MAC2, wherein n is positive integer;By address be MAC2 message length and address be MAC1 the length of air message match;When successful match, confirm that the hotspot has accessed current particular network.The embodiment of the present invention passes through the message length of matching hotspot side and the message length of particular network side, it can accurately identify whether hotspot is linked into particular network, to take counter-measure to the hotspot of invasion, and then ensure the operational safety of particular network.
Description
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of method and apparatus for identifying wireless invasive.
Background technique
Present wireless router, carry-on WIFI, mobile phone build hot spot and cause huge hidden danger to the network security of enterprise.
Employee is easy to that modes create a shared hot spot, the safe energy of these hot spots by the way that carry-on WIFI or mobile phone be shared etc.
Power is weaker, it is easy to allow illegal user to access corporate intranet, bring about great losses to enterprise.Existing many WIFI are produced safely
Product modes, the existing hot spot in discovery company such as can scan by WIFI, but not can confirm that whether the hot spot has accessed company
Intranet.
Summary of the invention
For prior art problem, the embodiment of the present invention provides a kind of method and apparatus for identifying wireless invasive.
In a first aspect, the embodiment of the present invention provides a kind of method for identifying wireless invasive, which comprises
Data on monitoring wireless network obtain the MAC Address of the hotspot carried in air message, are denoted as MAC1;
The data on current particular network are monitored, the message that MAC Address is MAC1 ± n is obtained, MAC1 ± n is denoted as
MAC2, wherein n is positive integer;
By address be MAC2 message length and address be MAC1 the length of air message match;
When successful match, confirm that the hotspot has accessed current particular network.
Second aspect, the embodiment of the present invention provide a kind of device for identifying wireless invasive, and described device includes:
First acquisition unit obtains the hotspot carried in air message for the data on monitoring wireless network
MAC Address is denoted as MAC1;
Second acquisition unit obtains the message that MAC Address is MAC1 ± n for monitoring the data on current particular network,
MAC1 ± n is denoted as MAC2, wherein n is positive integer;
Matching unit, the length progress for the air message that the length for the message for being MAC2 by address and address are MAC1
Matching;
Confirmation unit, for confirming that the hotspot has accessed current particular network when successful match.
The third aspect, the embodiment of the present invention also provide a kind of electronic equipment, including memory, processor and are stored in
On reservoir and the computer program that can run on a processor, the processor realize above-mentioned first aspect when executing described program
The method of offer.
Fourth aspect, the embodiment of the present invention also provide a kind of non-transient computer readable storage medium, are stored thereon with meter
Calculation machine program realizes the method that above-mentioned first aspect provides when described program is executed by processor.
The embodiment of the present invention passes through the message length of matching hotspot side and the message length of particular network side, Neng Gouzhun
Really whether identification hotspot is linked into particular network, to take counter-measure to the hotspot of invasion, and then ensures special
Determine the operational safety of network.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair
Bright some embodiments for those of ordinary skill in the art without creative efforts, can be with root
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow diagram of the method for the identification wireless invasive that one embodiment of the invention provides;
Fig. 2 is the structural schematic diagram of the device for the identification wireless invasive that one embodiment of the invention provides;
Fig. 3 is the structural schematic diagram for the electronic equipment that one embodiment of the invention provides.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Fig. 1 shows a kind of flow diagram of method for identifying wireless invasive provided in an embodiment of the present invention.
As shown in Figure 1, it is provided in an embodiment of the present invention identification wireless invasive method specifically includes the following steps:
Data on S11, monitoring wireless network obtain the MAC Address of the hotspot carried in air message, are denoted as
MAC1;
Specifically, either carry-on WIFI or wireless router, use on the different port on the same product
MAC Address is continuously that last potential difference of MAC Address is not little in other words.
Wireless data is first listened to, the MAC Address of hotspot is obtained, is denoted as MAC1.
Data on S12, the current particular network of monitoring, obtain the message that MAC Address is MAC1 ± n, MAC1 ± n are denoted as
MAC2, wherein n is positive integer;
Specifically, monitoring network on wired networks, check whether there is MAC Address be MAC1 ± n (n can be 1,
2,4,8 etc.) message, this MAC Address are denoted as MAC2.If so, can tentatively judge that address connects for the hotspot of MAC1
Corporate wired network is entered.
The present invention identifies the MAC Address of hot spot using WIFI audiomonitor, while utilizing inner-mesh network message monitoring equipment
Monitor network message, if it find that have with the very similar message of hot spot MAC Address, it was initially believed that this hot spot accessed it is interior
Net.
S13, the length of air message that length and the address of the message for being MAC2 by address are MAC1 match;
Specifically, the information such as the length of WIFI message and Intranet association message are persistently compared, can further confirm that hot spot
Whether Intranet is accessed.
S14, when successful match, confirm that the hotspot has accessed current particular network.
The present invention can identify whether hotspot has accessed specified network.It identifies hotspot and has accessed ad hoc networks
After network, administrator can be handled the data of hotspot and hotspot according to the strategy of network management, ensure company
The network operation and network security.
The embodiment of the present invention passes through the message length of matching hotspot side and the message length of particular network side, Neng Gouzhun
Really whether identification hotspot is linked into particular network, to take counter-measure to the hotspot of invasion, and then ensures special
Determine the operational safety of network.
On the basis of the above embodiments, S13 is specifically included:
The length for the message that the address for obtaining current particular network side is MAC2, is denoted as (Len1, len2 ..., lenN);
The length for the air message that the address for obtaining hotspot side is MAC1, be denoted as (AP_len1, AP_len2 ...,
AP_lenM);
By address be MAC1 air message length be MAC2 with address the length of message carried out according to special ratios
Comparison;
When (Len1, len2 ..., the lenN) of special ratios has pair in (AP_len1, AP_len2 ..., AP_lenM)
When the value answered, successful match.
Specifically, the length for the message that persistently monitored address is MAC2 on wired networks, be denoted as (Len1, len2 ...,
LenN), while in the air message length of monitoring hotspot, it is denoted as (AP_len1, AP_len2 ..., AP_lenM).According to
Certain formula compares the message length on the message length and cable network of hotspot side, if meeting certain ratio
(AP_len1, AP_len2 ..., the AP_lenM) of example has corresponding value in (Len1, len2 ..., lenN), then can be confirmed
This hotspot has accessed company Intranet.
On the basis of the above embodiments, before S11, the method also includes:
Scanning obtains hotspot present in current particular network.
Specifically, existing many WIFI safety products such as can scan at the modes by WIFI, existing in discovery company
Hot spot, but existing product not can confirm that the hot spot of discovery, and which has accessed company Intranet, which does not access company Intranet.
On the basis of the above embodiments, before S14, the method also includes:
According to the management strategy at current specific network, the data of the hotspot and hotspot that illegally access are prevented
Imperial processing.
Specifically, it identifies after hotspot accessed particular network, administrator can be right according to the strategy of network management
The data of hotspot and hotspot are handled, and ensure the network operation and network security of company.
Fig. 2 shows a kind of structural schematic diagrams for the device for identifying wireless invasive provided in an embodiment of the present invention.
As shown in Fig. 2, the device of identification wireless invasive provided in an embodiment of the present invention includes first acquisition unit 11, second
Acquiring unit 12, matching unit 13 and confirmation unit 14, in which:
The first acquisition unit 11 carries wireless for the data on monitoring wireless network in acquisition air message
The MAC Address of hot spot, is denoted as MAC1;
Specifically, either carry-on WIFI or wireless router, use on the different port on the same product
MAC Address is continuously that last potential difference of MAC Address is not little in other words.
Wireless data is first listened to, the MAC Address of hotspot is obtained, is denoted as MAC1.
The second acquisition unit 12, for monitoring the data on current particular network, acquisition MAC Address is MAC1 ± n
Message, MAC1 ± n is denoted as MAC2, wherein n is positive integer;
Specifically, monitoring network on wired networks, check whether there is MAC Address be MAC1 ± n (n can be 1,
2,4,8 etc.) message, this MAC Address are denoted as MAC2.If so, can tentatively judge that address connects for the hotspot of MAC1
Corporate wired network is entered.
The present invention identifies the MAC Address of hot spot using WIFI audiomonitor, while utilizing inner-mesh network message monitoring equipment
Monitor network message, if it find that have with the very similar message of hot spot MAC Address, it was initially believed that this hot spot accessed it is interior
Net.
The matching unit 13, the length for the air message that the length for the message for being MAC2 by address and address are MAC1
Degree is matched;
Specifically, the information such as the length of WIFI message and Intranet association message are persistently compared, can further confirm that hot spot
Whether Intranet is accessed.
The confirmation unit 14, for confirming that the hotspot has accessed current particular network when successful match.
The present invention can identify whether hotspot has accessed specified network.It identifies hotspot and has accessed ad hoc networks
After network, administrator can be handled the data of hotspot and hotspot according to the strategy of network management, ensure company
The network operation and network security.
The embodiment of the present invention passes through the message length of matching hotspot side and the message length of particular network side, Neng Gouzhun
Really whether identification hotspot is linked into particular network, to take counter-measure to the hotspot of invasion, and then ensures special
Determine the operational safety of network.
On the basis of the above embodiments, the matching unit 13 includes:
First obtains module, and the length for the message that the address for obtaining current particular network side is MAC2 is denoted as
(Len1,len2…,lenN);
Second obtains module, and the length for the air message that the address for obtaining hotspot side is MAC1 is denoted as (AP_
len1,AP_len2,…,AP_lenM);
Contrast module, for the air message for being MAC1 by address length and address be MAC2 message length according to
Special ratios compare;
Judgment module, for (Len1, len2 ..., the lenN) when special ratios in (AP_len1, AP_len2 ..., AP_
When having corresponding value in lenM), successful match.
Specifically, the length for the message that persistently monitored address is MAC2 on wired networks, be denoted as (Len1, len2 ...,
LenN), while in the air message length of monitoring hotspot, it is denoted as (AP_len1, AP_len2 ..., AP_lenM).According to
Certain formula compares the message length on the message length and cable network of hotspot side, if meeting certain ratio
(AP_len1, AP_len2 ..., the AP_lenM) of example has corresponding value in (Len1, len2 ..., lenN), then can be confirmed
This hotspot has accessed company Intranet.
On the basis of the above embodiments, described device further include:
Scan module, before the data on monitoring wireless network, scanning is obtained present in current particular network
Hotspot.
Specifically, existing many WIFI safety products such as can scan at the modes by WIFI, existing in discovery company
Hot spot, but existing product not can confirm that the hot spot of discovery, and which has accessed company Intranet, which does not access company Intranet.
On the basis of the above embodiments, described device further include:
Processing unit, for after confirmation hotspot has accessed current particular network, according to current specific network
Management strategy is on the defensive processing to the data of the hotspot and hotspot that illegally access.
According to the management strategy at current specific network, the data of the hotspot and hotspot that illegally access are prevented
Imperial processing.
Specifically, it identifies after hotspot accessed particular network, administrator can be right according to the strategy of network management
The data of hotspot and hotspot are handled, and ensure the network operation and network security of company.
The embodiment of the present invention also provides a kind of electronic equipment, including memory, processor and storage are on a memory and can
The computer program run on a processor, the processor realize the method such as Fig. 1 when executing described program.
Fig. 3 shows the structural schematic diagram of the electronic equipment of one embodiment of the invention offer.
As shown in figure 3, electronic equipment provided in an embodiment of the present invention include memory 21, processor 22, bus 23 and
It is stored in the computer program that can be run on memory 21 and on processor 22.Wherein, the memory 21, processor 22 are logical
It crosses the bus 23 and completes mutual communication.
The processor 22 is used to call the program instruction in the memory 21, realizes when executing described program as schemed
1 method.
For example, the processor realizes following method when executing described program:
Data on monitoring wireless network obtain the MAC Address of the hotspot carried in air message, are denoted as MAC1;
The data on current particular network are monitored, the message that MAC Address is MAC1 ± n is obtained, MAC1 ± n is denoted as
MAC2, wherein n is positive integer;
By address be MAC2 message length and address be MAC1 the length of air message match;
When successful match, confirm that the hotspot has accessed current particular network.
Electronic equipment provided in an embodiment of the present invention, by the message length and the particular network side that match hotspot side
Message length, can accurately identify whether hotspot is linked into particular network, to take reply to the hotspot of invasion
Measure, and then ensure the operational safety of particular network.
The embodiment of the present invention also provides a kind of non-transient computer readable storage medium, and meter is stored on the storage medium
Calculation machine program is realized when described program is executed by processor such as the step of Fig. 1.
For example, the processor realizes following method when executing described program:
Data on monitoring wireless network obtain the MAC Address of the hotspot carried in air message, are denoted as MAC1;
The data on current particular network are monitored, the message that MAC Address is MAC1 ± n is obtained, MAC1 ± n is denoted as
MAC2, wherein n is positive integer;
By address be MAC2 message length and address be MAC1 the length of air message match;
When successful match, confirm that the hotspot has accessed current particular network.
Non-transient computer readable storage medium provided in an embodiment of the present invention is long by the message for matching hotspot side
The message length of degree and particular network side, can accurately identify whether hotspot is linked into particular network, thus to invasion
Hotspot takes counter-measure, and then ensures the operational safety of particular network.
One embodiment of the invention discloses a kind of computer program product, and the computer program product is non-temporary including being stored in
Computer program on state computer readable storage medium, the computer program include program instruction, when described program instructs
When being computer-executed, computer is able to carry out method provided by above-mentioned each method embodiment, for example,
Data on monitoring wireless network obtain the MAC Address of the hotspot carried in air message, are denoted as MAC1;
The data on current particular network are monitored, the message that MAC Address is MAC1 ± n is obtained, MAC1 ± n is denoted as
MAC2, wherein n is positive integer;
By address be MAC2 message length and address be MAC1 the length of air message match;
When successful match, confirm that the hotspot has accessed current particular network.
Functional module in the embodiment of the present invention can pass through hardware processor (hardware processor) Lai Shixian
Related function module, the embodiment of the present invention repeat no more.
The apparatus embodiments described above are merely exemplary, wherein described, unit can as illustrated by the separation member
It is physically separated with being or may not be, component shown as a unit may or may not be physics list
Member, it can it is in one place, or may be distributed over multiple network units.It can be selected according to the actual needs
In some or all of the modules achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creativeness
Labour in the case where, it can understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can
It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on
Stating technical solution, substantially the part that contributes to existing technology can be embodied in the form of software products in other words, should
Computer software product may be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including several fingers
It enables and using so that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation
Method described in certain parts of example or embodiment.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although
Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used
To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features;
And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and
Range.
Claims (10)
1. a kind of method for identifying wireless invasive, which is characterized in that the described method includes:
Data on monitoring wireless network obtain the MAC Address of the hotspot carried in air message, are denoted as MAC1;
The data on current particular network are monitored, the message that MAC Address is MAC1 ± n is obtained, MAC1 ± n is denoted as MAC2,
In, n is positive integer;
By address be MAC2 message length and address be MAC1 the length of air message match;
When successful match, confirm that the hotspot has accessed current particular network.
2. the method according to claim 1, wherein the length of the message for being MAC2 by address is with address
The length of the air message of MAC1 carries out matching
The length for the message that the address for obtaining current particular network side is MAC2, is denoted as (Len1, len2 ..., lenN);
The length for the air message that the address for obtaining hotspot side is MAC1, is denoted as (AP_len1, AP_len2 ..., AP_
lenM);
By address be MAC1 air message length be MAC2 with address the length of message compared according to special ratios;
When (Len1, len2 ..., the lenN) of special ratios have in (AP_len1, AP_len2 ..., AP_lenM) it is corresponding
When value, successful match.
3. the method according to claim 1, wherein before the data on monitoring wireless network, the method
Further include:
Scanning obtains hotspot present in current particular network.
4. the method according to claim 1, wherein confirmation hotspot accessed current particular network it
Afterwards, the method also includes:
According to the management strategy at current specific network, it is on the defensive place to the data of the hotspot and hotspot that illegally access
Reason.
5. a kind of device for identifying wireless invasive, which is characterized in that described device includes:
First acquisition unit, for the data on monitoring wireless network, with obtaining the MAC of the hotspot carried in air message
Location is denoted as MAC1;
Second acquisition unit, for monitoring the data on current particular network, the message that acquisition MAC Address is MAC1 ± n will
MAC1 ± n is denoted as MAC2, wherein n is positive integer;
Matching unit, the length progress for the air message that the length for the message for being MAC2 by address and address are MAC1
Match;
Confirmation unit, for confirming that the hotspot has accessed current particular network when successful match.
6. device according to claim 5, which is characterized in that the matching unit includes:
First obtains module, the length for the message that the address for obtaining current particular network side is MAC2, be denoted as (Len1,
len2…,lenN);
Second obtains module, the length for the air message that the address for obtaining hotspot side is MAC1, be denoted as (AP_len1,
AP_len2,…,AP_lenM);
Contrast module, the length for the message that length and address for the air message for being MAC1 by address are MAC2 is according to specific
Ratio compares;
Judgment module, for (Len1, len2 ..., the lenN) when special ratios at (AP_len1, AP_len2 ..., AP_lenM)
In when having corresponding value, successful match.
7. device according to claim 5, which is characterized in that described device further include:
Scan module, before the data on monitoring wireless network, scanning obtains wireless present in current particular network
Hot spot.
8. device according to claim 5, which is characterized in that described device further include:
Processing unit, for after confirmation hotspot has accessed current particular network, according to the management at current specific network
Strategy is on the defensive processing to the data of the hotspot and hotspot that illegally access.
9. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor
Machine program, which is characterized in that realized when the processor executes described program and identify nothing as described in any one of Claims 1-4
The step of method of line invasion.
10. a kind of non-transient computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer
The step of method that wireless invasive is identified as described in any one of Claims 1-4 is realized when program is executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811580402.8A CN109803264B (en) | 2018-12-24 | 2018-12-24 | Method and device for recognizing wireless intrusion |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811580402.8A CN109803264B (en) | 2018-12-24 | 2018-12-24 | Method and device for recognizing wireless intrusion |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109803264A true CN109803264A (en) | 2019-05-24 |
CN109803264B CN109803264B (en) | 2022-04-29 |
Family
ID=66557440
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811580402.8A Active CN109803264B (en) | 2018-12-24 | 2018-12-24 | Method and device for recognizing wireless intrusion |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109803264B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112153631A (en) * | 2019-06-28 | 2020-12-29 | 北京奇虎科技有限公司 | Method and device for identifying illegal intrusion and router |
CN112437439A (en) * | 2020-11-11 | 2021-03-02 | 周金华 | Hot spot sharing method based on artificial intelligence and feature analysis and big data cloud platform |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070286143A1 (en) * | 2003-07-28 | 2007-12-13 | Olson Timothy S | Method, apparatus, and software product for detecting rogue access points in a wireless network |
CN104125568A (en) * | 2014-08-11 | 2014-10-29 | 醴陵恒茂电子科技有限公司 | Wireless access point safe authentication method and system |
CN104869576A (en) * | 2014-02-24 | 2015-08-26 | 北京奇虎科技有限公司 | Identification method and device of wireless hot spot |
CN105554740A (en) * | 2015-12-31 | 2016-05-04 | 北京神州绿盟信息安全科技股份有限公司 | Method and apparatus for identifying wireless hotspots, and device |
CN106507363A (en) * | 2017-01-06 | 2017-03-15 | 北京锐云通信息技术有限公司 | A kind of method for finding fishing access point |
CN106658756A (en) * | 2016-12-13 | 2017-05-10 | 浙江大华技术股份有限公司 | Method and device for recognizing connection between terminal device and hotspot |
CN107995626A (en) * | 2017-12-04 | 2018-05-04 | 锐捷网络股份有限公司 | A kind of method and apparatus for identifying WIFI signal security class in WLAN |
-
2018
- 2018-12-24 CN CN201811580402.8A patent/CN109803264B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070286143A1 (en) * | 2003-07-28 | 2007-12-13 | Olson Timothy S | Method, apparatus, and software product for detecting rogue access points in a wireless network |
CN104869576A (en) * | 2014-02-24 | 2015-08-26 | 北京奇虎科技有限公司 | Identification method and device of wireless hot spot |
CN104125568A (en) * | 2014-08-11 | 2014-10-29 | 醴陵恒茂电子科技有限公司 | Wireless access point safe authentication method and system |
CN105554740A (en) * | 2015-12-31 | 2016-05-04 | 北京神州绿盟信息安全科技股份有限公司 | Method and apparatus for identifying wireless hotspots, and device |
CN106658756A (en) * | 2016-12-13 | 2017-05-10 | 浙江大华技术股份有限公司 | Method and device for recognizing connection between terminal device and hotspot |
CN106507363A (en) * | 2017-01-06 | 2017-03-15 | 北京锐云通信息技术有限公司 | A kind of method for finding fishing access point |
CN107995626A (en) * | 2017-12-04 | 2018-05-04 | 锐捷网络股份有限公司 | A kind of method and apparatus for identifying WIFI signal security class in WLAN |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112153631A (en) * | 2019-06-28 | 2020-12-29 | 北京奇虎科技有限公司 | Method and device for identifying illegal intrusion and router |
CN112437439A (en) * | 2020-11-11 | 2021-03-02 | 周金华 | Hot spot sharing method based on artificial intelligence and feature analysis and big data cloud platform |
CN112437439B (en) * | 2020-11-11 | 2021-08-31 | 曙光星云信息技术(北京)有限公司 | Hot spot sharing method based on artificial intelligence and feature analysis and big data cloud platform |
Also Published As
Publication number | Publication date |
---|---|
CN109803264B (en) | 2022-04-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103313429B (en) | A kind of processing method identifying forgery WIFI hot spot | |
CN106851632A (en) | A kind of smart machine accesses the method and device of WLAN | |
CN109803264A (en) | The method and apparatus for identifying wireless invasive | |
CN103888480B (en) | Network information security authentication method and cloud device based on cloud monitoring | |
CN105306414A (en) | Port vulnerability detection method, device and system | |
CN103856957A (en) | Method and device for detecting counterfeit AP in wireless local area network | |
CN105100048B (en) | WiFi network secure authentication method, server, client terminal device and system | |
CN106302104A (en) | A kind of customer relationship recognition methods and device | |
CN106156915A (en) | A kind of wireless Work attendance method, Apparatus and system | |
CN107483381A (en) | The monitoring method and device of interlock account | |
CN107135149A (en) | A kind of method and apparatus for being used to recommend social user | |
CN105468981B (en) | Plug-in security scanning means and scan method based on loophole identification technology | |
CN106961683A (en) | A kind of method, system and finder AP for detecting rogue AP | |
CN107248995A (en) | Account verification method and device | |
WO2018072733A1 (en) | Webpage security check method and device | |
CN107295519A (en) | A kind of wireless network access method, apparatus and system | |
CN105873180B (en) | Method and apparatus for setting up wireless connection | |
CN108430063A (en) | A kind of method and apparatus for monitoring ARP deceptions in WLAN | |
CN106131786B (en) | The acquisition methods and device of additional population data | |
CN108307526A (en) | Equipment connection method and Related product | |
CN106302345A (en) | A kind of terminal authentication method and device | |
CN114615066A (en) | Target path determination method and device | |
CN107995650B (en) | Method and device for acquiring neighbor cell identifier | |
CN106375259A (en) | Same-user account identification method and apparatus | |
CN111930653B (en) | Remote distribution use method and device of USB (universal serial bus) equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Room 332, 3 / F, Building 102, 28 xinjiekouwei street, Xicheng District, Beijing 100088 Applicant after: Qianxin Technology Group Co.,Ltd. Address before: 100015 15, 17 floor 1701-26, 3 building, 10 Jiuxianqiao Road, Chaoyang District, Beijing. Applicant before: BEIJING QIANXIN TECHNOLOGY Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |