CN110087242B - Method for rapidly judging legality of wireless access equipment in industrial control environment - Google Patents

Method for rapidly judging legality of wireless access equipment in industrial control environment Download PDF

Info

Publication number
CN110087242B
CN110087242B CN201910357111.0A CN201910357111A CN110087242B CN 110087242 B CN110087242 B CN 110087242B CN 201910357111 A CN201910357111 A CN 201910357111A CN 110087242 B CN110087242 B CN 110087242B
Authority
CN
China
Prior art keywords
wireless access
access equipment
wireless
equipment
illegal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910357111.0A
Other languages
Chinese (zh)
Other versions
CN110087242A (en
Inventor
龚海澎
欧晓聪
王庭宇
李明明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Yingdesaike Technology Co ltd
Original Assignee
Sichuan Yingdesaike Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Yingdesaike Technology Co ltd filed Critical Sichuan Yingdesaike Technology Co ltd
Priority to CN201910357111.0A priority Critical patent/CN110087242B/en
Publication of CN110087242A publication Critical patent/CN110087242A/en
Application granted granted Critical
Publication of CN110087242B publication Critical patent/CN110087242B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a method for quickly judging the legality of wireless access equipment in an industrial control environment, which comprises the following steps: the administrator sets the known wireless access device as a legal wireless access device or an illegal wireless access device; step two: receiving new wireless access equipment information sent by a wireless access equipment monitoring unit, writing the new wireless access equipment information into an industrial-grade large-capacity storage device, and judging the legality of the wireless access equipment by confirming whether MAC address information of the wireless access equipment exists in a blacklist of the wireless access equipment; step three: if the blacklist of the wireless access equipment does not have the MAC address information of the wireless access equipment, judging the legality of the wireless access equipment by confirming whether a wireless hotspot connected with the wireless access equipment is an illegal wireless hotspot. Therefore, the invention not only can solve the problem of legality detection of the wireless access equipment in the industrial control system environment, but also can send out warning, early warning and notification messages in time, thereby playing a positive and effective safety protection role for the industrial control system network.

Description

Method for rapidly judging legality of wireless access equipment in industrial control environment
Technical Field
The invention belongs to the field of wireless communication safety, and particularly relates to a method for quickly judging the legality of wireless access equipment in an industrial control environment.
Background
With the continuous deepening of informatization and industrialization integration, industrial control systems are connected with one another from a single machine, opened from a closed state and intelligentized from an automatic state. While productivity has increased dramatically, industrial control systems face increasingly severe cyber-security threats. To address these network security threats, the real-time production control area of an industrial control system is typically divided into separate networks for physical isolation. However, with the development of communication technology, the WIFI technology is widely applied by virtue of its own advantages, brings great safety hazards while bringing wide convenience to people, and especially in an industrial control site, the use of a wireless hotspot can easily break through the limitation of an isolation network, and an industrial control system which should be physically isolated is connected to the internet, so that a great safety hazard is formed. Therefore, in an industrial control site, illegal wireless hotspot access is generally not allowed due to the security protection requirement. However, how to monitor whether wireless hotspots exist in an industrial control field environment, which wireless hotspots exist, and whether wireless devices are connected with a certain wireless hotspot or not, how to distinguish an illegal wireless hotspot from a legal hotspot, and send out warning information in time when the illegal wireless hotspot is found, and a corresponding solution is not provided under the requirement of an industrial control system environment at present.
The current mainstream wireless WIFI network equipment supports 802.11a/b/g/n/ac, 13 channels can be used by WIFI signals in a 2.4GHz frequency band, the channel number is from 1 to 13, the center frequency is from 2412MHz to 2472MHz, and the bandwidth of each channel is 20 MHz; the 5GHz frequency band can use 19 channels, wherein, because of the overlapping of partial channels, 13 channels are actually used, the channel numbers are 36, 40, 44, 48, 52, 56, 60, 64, 149, 153, 157, 161 and 165, the center frequency is from 5180MHz to 5825MHz, and the bandwidth of each channel is 20 MHz. The wireless access device selects a wireless hotspot on a certain channel to attempt to access and wirelessly communicate with the wireless hotspot. The existing device for discovering the universal wireless access equipment cannot adapt to the severe environmental requirements of an industrial control system and cannot meet the requirement of continuous uninterrupted operation for 7 x 24 hours. The wireless access device discovery technology used at present can only know which wireless access devices try to access or have accessed in the periphery through the wireless hotspot, but cannot know which wireless access devices try to access or have accessed in other wireless hotspots, and cannot screen illegal wireless access devices from legal wireless access devices because the wireless access devices lack the screening capability of the wireless access devices.
Disclosure of Invention
The invention aims to provide a method for rapidly judging the legality of wireless access equipment in an industrial control environment, which not only can solve the problem of detecting the legality of the wireless access equipment in the industrial control system environment, but also can give out warning in time.
Another objective of the present invention is to provide a method for quickly determining validity of a wireless access device in an industrial control environment, wherein the method for determining validity of a wireless access device includes the following steps:
the method comprises the following steps: the method comprises the following steps that an administrator sets known wireless access equipment into legal wireless access equipment or illegal wireless access equipment, wherein the legal wireless access equipment records a white list of the wireless access equipment, and the illegal wireless access equipment records a black list of the wireless access equipment;
step two: receiving new wireless access equipment information sent by a wireless access equipment monitoring unit, writing the new wireless access equipment information into an industrial-grade large-capacity storage device, and judging the legality of the wireless access equipment by confirming whether MAC address information of the wireless access equipment exists in a blacklist of the wireless access equipment;
step three: if the blacklist of the wireless access equipment does not have the MAC address information of the wireless access equipment, judging the legality of the wireless access equipment by confirming whether a wireless hotspot connected with the wireless access equipment is an illegal wireless hotspot.
Preferably, in the second step, if the MAC address information of the wireless access device exists in the blacklist of the wireless access device, it is determined that the wireless access device is an illegal wireless access device, and alarm information is sent to illegal access alarm software.
Preferably, in the third step, if the wireless hotspot connected with the wireless access device is an illegal wireless hotspot, it is determined that the wireless access device is an illegal wireless access device, and the wireless access device is added into a blacklist of the illegal wireless access device, and then the blacklist information of the wireless access device is pushed to other wireless hotspot monitoring software in the whole network, and then the warning information is sent to the illegal access warning software.
Preferably, in step three, if the wireless hotspot to which the wireless access device is connected is not an illegal wireless hotspot, determining whether the MAC address information of the wireless access device exists in a white list of the wireless access device to determine the validity of the wireless access device.
Further preferably, if the white list of the wireless access device contains the MAC address information of the wireless access device, the wireless access device is determined to be a valid wireless access device and sends notification information to the illegal access warning software; if the MAC address information of the wireless access equipment does not exist in the white list of the wireless access equipment, the wireless access equipment is judged to be a suspicious hotspot, and early warning information is sent to illegal access warning software.
Preferably, the specific implementation method in the step one comprises the following steps:
the administrator refers to the information of the appointed wireless access equipment and sets the wireless access equipment as illegal wireless access equipment or legal wireless access equipment through selection operation;
when the wireless access equipment is set as illegal wireless access equipment, firstly, whether the wireless access equipment is recorded in a white list is confirmed, and then blacklist information of the wireless access equipment is pushed to other wireless access equipment monitoring units in the whole network;
when the wireless access equipment is set as legal wireless access equipment, whether the wireless access equipment is recorded in a blacklist is firstly confirmed, and then white list information of the wireless access equipment is pushed to other wireless access equipment monitoring units in the whole network.
Further preferably, if the MAC address information is recorded in the white list, the MAC address information of the wireless access device is removed from the white list, stored in the black list, and written in the industrial-grade mass storage device; if the MAC address information is not recorded in the white list, the MAC address information of the wireless access equipment is stored in the black list and is written into an industrial-grade large-capacity storage device.
Further preferably, if the MAC address information is recorded in the blacklist, the MAC address information of the wireless access device is removed from the blacklist, stored in the whitelist, and written in the industrial-grade mass storage device; if the MAC address information is not recorded in the blacklist, the MAC address information of the wireless access equipment is stored in a white list and is written into an industrial-grade large-capacity storage device.
Compared with the prior art, the invention has the beneficial effects that: the invention can greatly improve the accuracy of the legality identification of the wireless connection equipment by adopting the comprehensive factor judgment condition, can realize the quick identification of the legality of the wireless connection equipment by combining a black-and-white list mechanism of the wireless connection equipment, effectively prevent the wireless connection equipment from being judged neglectedly and reduce the judgment difficulty of managers, can realize the quick detection when the wireless connection equipment is transferred to other industrial control sites by combining the black-and-white list whole network broadcasting mode of the wireless connection equipment, and finally realizes the effective identification of the illegal wireless connection equipment connection wireless hotspot at the first time and prevents the illegal wireless connection equipment from entering the industrial control site.
Drawings
FIG. 1 is a schematic diagram of the basic flow of the method described in the examples of the present invention.
Fig. 2 is a schematic flow chart of a first step of the method according to the embodiment of the present invention.
Detailed Description
The invention is further described with reference to the following figures and detailed description.
As shown in fig. 1, an embodiment of the present invention provides a method for quickly determining validity of a wireless access device in an industrial control environment, where the method for determining validity of a wireless access device includes:
the method comprises the following steps: the method comprises the following steps that an administrator sets known wireless access equipment into legal wireless access equipment or illegal wireless access equipment, wherein the legal wireless access equipment records a white list of the wireless access equipment, and the illegal wireless access equipment records a black list of the wireless access equipment; in the embodiment of the invention, the wireless hotspot monitoring software is a wireless hotspot monitoring device.
Step two: receiving new wireless access equipment information sent by a wireless access equipment monitoring unit, writing the new wireless access equipment information into an industrial-grade large-capacity storage device, and judging the legality of the wireless access equipment by confirming whether MAC address information of the wireless access equipment exists in a blacklist of the wireless access equipment; if the MAC address information of the wireless access equipment exists in the blacklist of the wireless access equipment, the wireless access equipment is judged to be illegal wireless access equipment, and alarm information is sent to illegal access alarm software.
Step three: if the blacklist of the wireless access equipment does not have the MAC address information of the wireless access equipment, judging the legality of the wireless access equipment by confirming whether a wireless hotspot connected with the wireless access equipment is an illegal wireless hotspot. If the wireless hotspot connected with the wireless access equipment is an illegal wireless hotspot, judging that the wireless access equipment is illegal wireless access equipment, adding the wireless access equipment into a blacklist of the illegal wireless access equipment, pushing the blacklist information of the wireless access equipment to other wireless hotspot monitoring software in the whole network, and sending alarm information to illegal access alarm software.
If the wireless hotspot connected with the wireless access equipment is not an illegal wireless hotspot, judging the legality of the wireless access equipment by confirming whether the MAC address information of the wireless access equipment exists in a white list of the wireless access equipment. If the wireless access equipment white list contains the MAC address information of the wireless access equipment, judging that the wireless access equipment is legal wireless access equipment and sending notification information to illegal access warning software; if the MAC address information of the wireless access equipment does not exist in the white list of the wireless access equipment, the wireless access equipment is judged to be suspicious wireless access equipment, and early warning information is sent to illegal access warning software.
As shown in fig. 2, in step one according to the embodiment of the present invention, an administrator accesses information of a specified wireless access device and sets the wireless access device as an illegal wireless access device or a legal wireless access device through a selection operation; when the wireless access equipment is set as illegal wireless access equipment, firstly, whether the wireless access equipment is recorded in a white list is confirmed, and then blacklist information of the wireless access equipment is pushed to other wireless access equipment monitoring units in the whole network; when the wireless access equipment is set as legal wireless access equipment, whether the wireless access equipment is recorded in a blacklist is firstly confirmed, and then white list information of the wireless access equipment is pushed to other wireless access equipment monitoring units in the whole network.
If the MAC address information is recorded in the white list, the MAC address information of the wireless access equipment is removed from the white list, stored in a black list and written into an industrial large-capacity storage device; if the MAC address information is not recorded in the white list, the MAC address information of the wireless access equipment is stored in the black list and is written into an industrial-grade large-capacity storage device.
If the MAC address information is recorded in the blacklist, the MAC address information of the wireless access equipment is removed from the blacklist, stored in a white list and written into an industrial-grade large-capacity storage device; if the MAC address information is not recorded in the blacklist, the MAC address information of the wireless access equipment is stored in a white list and is written into an industrial-grade large-capacity storage device.
In order to better understand the method of the embodiment of the present invention, the following description is specifically made: the wireless access equipment monitoring unit module rapidly judges whether the wireless connection equipment is illegal wireless connection equipment or not through comprehensive factors such as wireless hotspots, appearance histories and the like connected with the wireless connection equipment. Since the industrial control site usually does not allow the wireless connection device to connect to the wireless hotspot, once a certain wireless connection device is found to connect to an illegal wireless hotspot, or the MAC address information of the wireless connection device is registered in the wireless connection device blacklist record, the wireless connection device is immediately determined as an illegal wireless connection device and alarm information is issued, and if the MAC address information is not registered in the wireless connection device blacklist, the information such as the MAC address of the wireless connection device is added to the wireless connection device blacklist; if the wireless connection equipment is connected with the suspicious wireless hotspot, the wireless connection equipment is judged as the suspicious wireless connection equipment, and early warning information is sent out; if the wireless connection equipment is connected with a legal wireless hotspot and the wireless connection equipment is not in the white list record, the wireless connection equipment is also judged as suspicious wireless connection equipment, and early warning information is sent out; if the wireless connection device is connected with a legal wireless hotspot and the wireless connection device is in the white list record, the wireless connection device is judged as a legal wireless connection device, and notification information is sent. After receiving the warning information of the illegal wireless connection equipment or the early warning information of the suspicious wireless connection equipment, the manager can perform secondary manual judgment by looking up the recording information of the wireless connection equipment, and once the manager judges the suspicious wireless connection equipment as the illegal wireless connection equipment, the manager records the related information such as the MAC address of the wireless connection equipment into a blacklist of the wireless connection equipment and pushes the blacklist to other wireless hotspot monitoring devices of the whole network; the administrator can also determine that the wireless connection device is illegal or suspicious as a legal wireless connection device, record the related information such as the MAC address of the wireless connection device into a white list of the local wireless connection device, and if the information of the wireless connection device is already registered in a black list of the wireless connection device, remove the information from the black list of the wireless connection device, and the white list information is not broadcast and pushed to other wireless hotspot monitoring devices in the whole network.
By the aid of the method, wireless channels in the industrial control system environment can be comprehensively monitored, legitimacy of the wireless connection equipment can be rapidly discriminated, alarm, early warning and notification messages are sent out at the first time, access of illegal wireless access equipment is effectively prevented, illegal external connection events caused by illegal access of the wireless access equipment are avoided, the industrial control system network is prevented from being intentionally or unintentionally connected to the Internet/extranet, and an active and effective safety protection effect is achieved on the industrial control system network.

Claims (7)

1. A method for rapidly judging the legality of wireless access equipment in an industrial control environment is characterized by comprising the following specific steps:
the method comprises the following steps: after receiving the warning information of the illegal wireless connection equipment or the early warning information of the suspicious wireless connection equipment, the administrator sets the known wireless access equipment into legal wireless access equipment or illegal wireless access equipment, wherein the legal wireless access equipment records a white list of the wireless access equipment, and the illegal wireless access equipment records a black list of the wireless access equipment; the specific implementation method comprises the following steps: the administrator refers to the information of the appointed wireless access equipment and sets the wireless access equipment as illegal wireless access equipment or legal wireless access equipment through selection operation; when the wireless access equipment is set as illegal wireless access equipment, firstly, whether the wireless access equipment is recorded in a white list is confirmed, and then blacklist information of the wireless access equipment is pushed to other wireless access equipment monitoring units in the whole network; when the wireless access equipment is set as legal wireless access equipment, firstly, whether the wireless access equipment is recorded in a blacklist is confirmed, and then white list information of the wireless access equipment is pushed to other wireless access equipment monitoring units in the whole network;
step two: receiving new wireless access equipment information sent by a wireless access equipment monitoring unit, writing the new wireless access equipment information into an industrial-grade large-capacity storage device, and judging the legality of the wireless access equipment by confirming whether MAC address information of the wireless access equipment exists in a blacklist of the wireless access equipment;
step three: if the blacklist of the wireless access equipment does not have the MAC address information of the wireless access equipment, judging the legality of the wireless access equipment by confirming whether a wireless hotspot connected with the wireless access equipment is an illegal wireless hotspot.
2. The method as claimed in claim 1, wherein in step two, if the MAC address information of the wireless access device exists in the blacklist of wireless access devices, the wireless access device is determined to be an illegal wireless access device, and an alarm message is sent to illegal access alarm software.
3. The method as claimed in claim 1, wherein in step three, if the wireless hotspot connected to the wireless access device is an illegal wireless hotspot, the wireless access device is determined to be an illegal wireless access device, the wireless access device is added to a blacklist of illegal wireless access devices, and then the blacklist information of the wireless access device is pushed to other wireless hotspot monitoring software in the whole network, and then an alarm message is sent to illegal access alarm software.
4. The method as claimed in claim 1, wherein in step three, if the hotspot to which the wireless access device is connected is not an illegal hotspot, the validity of the wireless access device is determined by determining whether the MAC address information of the wireless access device exists in a white list of the wireless access device.
5. The method as claimed in claim 4, wherein if the white list of the wireless access device includes the MAC address information of the wireless access device, the wireless access device is determined to be a valid wireless access device and sends a notification message to the illegal access warning software; if the MAC address information of the wireless access equipment does not exist in the white list of the wireless access equipment, the wireless access equipment is judged to be suspicious wireless access equipment, and early warning information is sent to illegal access warning software.
6. The method as claimed in claim 1, wherein if the wireless access device is configured as an illegal wireless access device and the MAC address information thereof is recorded in a white list, the MAC address information of the wireless access device is removed from the white list and written into an industrial-grade mass storage device; if the MAC address information is not recorded in the white list, the MAC address information of the wireless access equipment is stored in the black list and is written into an industrial-grade large-capacity storage device.
7. The method as claimed in claim 1, wherein if the wireless access device is configured as a valid wireless access device and the MAC address information thereof is recorded in a blacklist, the MAC address information of the wireless access device is removed from the blacklist and written into an industrial-grade mass storage device; if the MAC address information is not recorded in the blacklist, the MAC address information of the wireless access equipment is stored in a white list and is written into an industrial-grade large-capacity storage device.
CN201910357111.0A 2019-04-29 2019-04-29 Method for rapidly judging legality of wireless access equipment in industrial control environment Active CN110087242B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910357111.0A CN110087242B (en) 2019-04-29 2019-04-29 Method for rapidly judging legality of wireless access equipment in industrial control environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910357111.0A CN110087242B (en) 2019-04-29 2019-04-29 Method for rapidly judging legality of wireless access equipment in industrial control environment

Publications (2)

Publication Number Publication Date
CN110087242A CN110087242A (en) 2019-08-02
CN110087242B true CN110087242B (en) 2020-08-21

Family

ID=67417772

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910357111.0A Active CN110087242B (en) 2019-04-29 2019-04-29 Method for rapidly judging legality of wireless access equipment in industrial control environment

Country Status (1)

Country Link
CN (1) CN110087242B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111541721B (en) * 2020-05-21 2022-05-27 四川英得赛克科技有限公司 Attack monitoring method and system applied to industrial control environment
CN111913430B (en) * 2020-06-30 2022-03-18 物耀安全科技(杭州)有限公司 Detection and protection method and system for control behavior of industrial control system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014459A (en) * 2010-11-25 2011-04-13 中国联合网络通信集团有限公司 Wireless access control method and device
CN106302373A (en) * 2015-06-25 2017-01-04 中兴通讯股份有限公司 A kind of connection control method and terminal
CN107124717A (en) * 2017-03-31 2017-09-01 捷开通讯(深圳)有限公司 A kind of network connection management method, mobile terminal and storage device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103856941A (en) * 2012-12-05 2014-06-11 腾讯科技(深圳)有限公司 Wireless network monitoring method and related device
EP3213243B1 (en) * 2014-10-31 2020-09-09 Proofpoint, Inc. Systems and methods for privately performing application security analysis
CN106878992B (en) * 2015-12-18 2020-02-18 北京奇虎科技有限公司 Wireless network security detection method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014459A (en) * 2010-11-25 2011-04-13 中国联合网络通信集团有限公司 Wireless access control method and device
CN106302373A (en) * 2015-06-25 2017-01-04 中兴通讯股份有限公司 A kind of connection control method and terminal
CN107124717A (en) * 2017-03-31 2017-09-01 捷开通讯(深圳)有限公司 A kind of network connection management method, mobile terminal and storage device

Also Published As

Publication number Publication date
CN110087242A (en) 2019-08-02

Similar Documents

Publication Publication Date Title
US8787576B2 (en) System and method for detecting unauthorized wireless access points
US7426383B2 (en) Wireless LAN intrusion detection based on location
US8898783B2 (en) Detecting malicious device
CN110012469B (en) Method for rapidly judging validity of wireless hotspot in industrial control environment
CN105681272B (en) The detection of mobile terminal fishing WiFi a kind of and resist method
WO2020249118A1 (en) Cell handover method, communication apparatus and system
US11250172B2 (en) Handling wireless client devices associated with a role indicating a stolen device
US20190387408A1 (en) Wireless access node detecting method, wireless network detecting system and server
US9763169B2 (en) Geographical detection of mobile terminals
CN110087242B (en) Method for rapidly judging legality of wireless access equipment in industrial control environment
CN108012271B (en) Pseudo base station discovery method and device
CN105263142A (en) Method and device for identifying pseudo base station
KR102323712B1 (en) Wips sensor and method for preventing an intrusion of an illegal wireless terminal using wips sensor
CN105052177A (en) Wireless network system, terminal management device, wireless relay device, and communications method
CN104486764A (en) Wireless network detection method, server and wireless network sensor
CN109982359B (en) Wireless hot spot monitoring device and method adopting multi-wireless hot spot monitoring technology
JP2018511282A (en) WIPS sensor and terminal blocking method using the same
US20110030035A1 (en) Method of managing authorization of private node b in a wireless communication system and related device
CN109922498B (en) Wireless hotspot monitoring device and method adopting single wireless hotspot monitoring technology
Meng et al. Building a wireless capturing tool for WiFi
CN115297466B (en) Antitheft method, antitheft system, antitheft equipment and antitheft storage medium for integrated small base station
CN106973068B (en) Illegal device discovery method and device
CN209627714U (en) A kind of hotspot monitoring device using single hotspot monitoring technology
WO2024169799A1 (en) Information reporting method and apparatus, terminal and readable storage medium
WO2021018069A1 (en) Method, apparatus and system for cell access

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant