CN110225514A - A kind of protecting sensitive data method for taking precautions against Wifi probe - Google Patents
A kind of protecting sensitive data method for taking precautions against Wifi probe Download PDFInfo
- Publication number
- CN110225514A CN110225514A CN201910398580.7A CN201910398580A CN110225514A CN 110225514 A CN110225514 A CN 110225514A CN 201910398580 A CN201910398580 A CN 201910398580A CN 110225514 A CN110225514 A CN 110225514A
- Authority
- CN
- China
- Prior art keywords
- address
- mac
- user
- wifi
- link
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/37—Managing security policies for mobile devices or for controlling mobile applications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of protecting sensitive data methods for taking precautions against wifi probe.The present invention includes the following steps: that 1, user opens the wifi function of equipment, enables the included random address mac of equipment, the true address Mac of user is placed in probe frame;2, the address a mac-ap dictionary is established, for binding mac and ap information and depositing in database;When user receives beacon frame, by frame the address mac and itself database be compared, if strange link, then the current address mac and ap information are bound, and be added in database, while actively asking the user whether to link;If selection link, marks safety, receives same address later and connect automatically;If selection is not connected to, non-security address is marked, and within a specified time no longer inquire.The present invention is solved due to wifi agreement self-defect, is easy the problem of user privacy information is actively exposed to wifi probe.
Description
Technical field
Present invention relates particularly to a kind of protecting sensitive data methods for taking precautions against Wifi probe.
Background technique
The also referred to as mobile hot spot of Wifi, is brand quality certification of the trade mark as product of Wi-Fi Alliance manufacturer, is a wound
It is built in the wireless local area network technology of 802.11 standard of IEEE.In network communications, data have been packaged into frame, and frame just refers to logical
A data block in letter.The structure of frame is divided into several types: control frame, management frame, data frame.Wherein beacon frame
(BeaconFrame): the main presence to declare some AP network.Beacon frame is periodically sent, mobile WiFi equipment can be allowed to learn
The presence of the network, so as to adjust parameter necessary to the network is added;Probe request (ProbeRequest): WiFi equipment
ProbeRequest frame will be utilized, which 802.11 network scans in region has at present.
WiFi probe is equivalent to an AP, and the surrounding broadcast transmission Beacon frame to oneself of its timing is attached for notifying
Close WiFi equipment, AP are existing.WiFi equipment, mobile phone, tablet computer etc. are also regularly sent comprising itself mac simultaneously
The probe frame of location looks for available AP nearby.As long as the equipment in WiFi probe overlay area opens WiFi function at this time
Can, probe can be collected into his MAC Address.
The harm of wifi probe: either for Android or apple user, as long as wifi probe is opened, user mobile phone
The address mac be possible to reveal.If the address mac of user has been acquired, then the big data by backstage carries out
Matching (because the address mac is unique), often a mobile phone app can just need user registration cell-phone number to obtain when registration
Identifying code, while the automatic IMEI code for obtaining user equipment, this three are combined, user just by people's precise positioning,
The right of privacy of user will will receive infringement.
Summary of the invention
The purpose of the present invention is to provide a kind of protecting sensitive data methods for taking precautions against wifi probe, make user will not be not
In the case where knowing, the true address mac of oneself cell phone apparatus is exposed to unsafe ap equipment (wifi probe).
The technical solution adopted by the present invention to solve the technical problems is as follows:
Step 1, user open the wifi function of equipment, the included random address mac of equipment are enabled, by the true of user
The address Mac is placed in probe frame, using the method for the random address mac, prevents autosensitization information leakage.
Step 2 establishes the address a mac-ap dictionary, for binding and being stored in the database by mac and ap information.
When user receives beacon frame, by frame the address mac and itself database be compared, if strange
The current address mac and ap information are then bound, and are added in database by link, while actively asking the user whether to link.If with
Family selection link, then mark this to be linked as secure address, when receiving same address later, then can connect automatically.If user selects
It selects and is not connected to, then this can be marked to be linked as non-security address, not give and link, and within a specified time, will not inquire again.
The present invention is soundd out using the random address mac: can prevent wifi when not connected, and without using the true address mac
Probe directly acquires privacy information;
The present invention establishes the address mac-ap dictionary.When attempting link, judge whether current link is safe by user, no
Meeting drive chain is connected to the strange link of safety problem hidden danger.
The present invention has the beneficial effect that:
It solves due to wifi agreement self-defect, is easy actively for user privacy information to be exposed to asking for wifi probe
Topic.
Wifi equipment is solved for the safety problem of the no any prevention of strange link, after applying the present invention,
Strange link is had to actively select just link by user.
Detailed description of the invention
Fig. 1 is process of the present invention.
Specific embodiment
Present invention will be further explained below with reference to the attached drawings and examples.
By taking the wireless network connection that WIFI equipment A and WIFI probe B is initiated as an example:
Step 1, WIFI equipment A send probe frame to WIFI probe B, and the address mac in probe frame has already passed through at this time
Random process, WIFI probe B sniff has arrived the current vacation address mac at this time, and real information is not leaked.
Step 2, WIFI probe B send beacon frame to WIFI equipment A, and WIFI equipment A is the discovery that strange chain after receiving
It connects, actively asks the user whether to connect, user observes current ap, if current ap is not the ap that oneself wants connection, can refuse
Link, wifi connection failure caused by strange link, real information are not revealed at this time.
Claims (1)
1. a kind of protecting sensitive data method for taking precautions against wifi probe, it is characterised in that include the following steps:
Step 1, user open the wifi function of equipment, enable the included random address mac of equipment, by the true Mac of user
Location is placed in probe frame, using the method for the random address mac, prevents autosensitization information leakage;
Step 2 establishes the address a mac-ap dictionary, for binding and being stored in the database by mac and ap information;
When user receives beacon frame, by frame the address mac and itself database be compared, if strange chain
It connects, then binds the current address mac and ap information, and be added in database, while actively asking the user whether to link;If user
Selection link, then mark this to be linked as secure address, when receiving same address later, then can connect automatically;If user selects
It is not connected to, then this can be marked to be linked as non-security address, not give and link, and within a specified time, will not inquire again.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910398580.7A CN110225514A (en) | 2019-05-14 | 2019-05-14 | A kind of protecting sensitive data method for taking precautions against Wifi probe |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910398580.7A CN110225514A (en) | 2019-05-14 | 2019-05-14 | A kind of protecting sensitive data method for taking precautions against Wifi probe |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110225514A true CN110225514A (en) | 2019-09-10 |
Family
ID=67821098
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910398580.7A Pending CN110225514A (en) | 2019-05-14 | 2019-05-14 | A kind of protecting sensitive data method for taking precautions against Wifi probe |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110225514A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060114863A1 (en) * | 2004-12-01 | 2006-06-01 | Cisco Technology, Inc. | Method to secure 802.11 traffic against MAC address spoofing |
CN103119974A (en) * | 2010-09-24 | 2013-05-22 | 英特尔公司 | System and method for maintaining privacy in a wireless network |
CN108024250A (en) * | 2016-11-02 | 2018-05-11 | 中兴通讯股份有限公司 | A kind of method and device of data protection transmission |
CN109714761A (en) * | 2019-02-25 | 2019-05-03 | 成都瑞小博科技有限公司 | A kind of method and system preventing MAC sniff |
-
2019
- 2019-05-14 CN CN201910398580.7A patent/CN110225514A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060114863A1 (en) * | 2004-12-01 | 2006-06-01 | Cisco Technology, Inc. | Method to secure 802.11 traffic against MAC address spoofing |
CN103119974A (en) * | 2010-09-24 | 2013-05-22 | 英特尔公司 | System and method for maintaining privacy in a wireless network |
CN108024250A (en) * | 2016-11-02 | 2018-05-11 | 中兴通讯股份有限公司 | A kind of method and device of data protection transmission |
CN109714761A (en) * | 2019-02-25 | 2019-05-03 | 成都瑞小博科技有限公司 | A kind of method and system preventing MAC sniff |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101395949B (en) | Method for supporting emergency calls on a wireless local area network | |
CN104902500B (en) | The automatic connection method and system of Wireless Communication Equipment and radio reception device | |
EP3118700B1 (en) | Intelligent home control method and system based on alljoyn technology | |
CN104205935B (en) | Method and apparatus for establishing calling in mobile communication system | |
US10477538B2 (en) | Time hopping in device-to-device transmissions | |
CN104302015A (en) | Adaptive WI-FI network connection method and system with hidden SSID | |
HUE035425T2 (en) | Prevention of replay attack in long term evolution device-to-device discovery | |
US8547946B2 (en) | Efficient creation of WLAN connections | |
RU2010109858A (en) | ACCESS MANAGEMENT FOR A SELF-ORGANIZING BASIC STATION WITH A SMALL COVERAGE AREA | |
CN102752737A (en) | Method used for wireless station and wireless station | |
JP5306460B2 (en) | Access authority changing method, core network device, base station and terminal | |
CN108632056A (en) | A kind of smart machine network collocating method and system | |
WO2014121507A1 (en) | Device-to-device communication method, terminal, and network device | |
CN104270720B (en) | Access the method, device and mobile terminal of Wireless LAN | |
CN107613471A (en) | A kind of WIFI hot spot information-pushing method, method of reseptance and device | |
CN102457850B (en) | A kind of method of access point and wireless stations secure connection access point | |
CN105847553A (en) | Incoming call management method and system | |
US9756665B2 (en) | Network assisted automatic disaster trigger to enable device-to-device (D2D) ad hoc communication | |
JP6410844B2 (en) | Method for improving or enabling radio coverage for a mobile communication network, user equipment adapted to have improved radio coverage, relay user equipment adapted to provide improved radio coverage to the user equipment, System, mobile communication network, program and computer program product for improving or enabling radio coverage for user equipment | |
CN104580652B (en) | Mobile terminal and its session authentication method based on DTMF | |
US8219139B2 (en) | Radio base station accommodating method and network device | |
WO2015184929A1 (en) | Method for achieving position confirmation, base station and terminal | |
JP2010062711A (en) | Base station device, and control node specifying method | |
WO2017005079A1 (en) | Data transmission method, device, and system | |
CN110225514A (en) | A kind of protecting sensitive data method for taking precautions against Wifi probe |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190910 |