CN110324832B - Wireless scanning method, network device and computer readable storage medium - Google Patents

Wireless scanning method, network device and computer readable storage medium Download PDF

Info

Publication number
CN110324832B
CN110324832B CN201810286444.4A CN201810286444A CN110324832B CN 110324832 B CN110324832 B CN 110324832B CN 201810286444 A CN201810286444 A CN 201810286444A CN 110324832 B CN110324832 B CN 110324832B
Authority
CN
China
Prior art keywords
channel
channels
scanning
target
configuring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810286444.4A
Other languages
Chinese (zh)
Other versions
CN110324832A (en
Inventor
黄正义
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanning Fulian Fugui Precision Industrial Co Ltd
Original Assignee
Nanning Fulian Fugui Precision Industrial Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanning Fulian Fugui Precision Industrial Co Ltd filed Critical Nanning Fulian Fugui Precision Industrial Co Ltd
Priority to CN201810286444.4A priority Critical patent/CN110324832B/en
Publication of CN110324832A publication Critical patent/CN110324832A/en
Application granted granted Critical
Publication of CN110324832B publication Critical patent/CN110324832B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method of wireless scanning, the method comprising: scanning a plurality of channels to acquire channel information of each channel in the plurality of channels; judging whether a target channel accessed to illegal equipment exists according to the channel information of each channel in the plurality of channels; configuring a first scanning strategy according to the target channel: when the target channels are multiple, giving weight to each target channel according to the channel information of each target channel; configuring the first scanning strategy according to the weight corresponding to each target channel; and executing the scanning operation of the next period according to at least the first scanning strategy. The wireless scanning method in the embodiment of the invention can adaptively adjust the scanning strategy and improve the efficiency of scanning illegal equipment.

Description

Wireless scanning method, network device and computer readable storage medium
Technical Field
The embodiment of the invention relates to the technical field of communication.
Background
With the proliferation of wireless networks, many organizations (e.g., businesses, universities, hospitals, etc.) have installed or are prepared to install wireless networks in addition to, or as an alternative to, wired networks. Such wireless networks are believed to improve efficiency and productivity. One of the drawbacks of wireless networks, however, is the security of such networks. Unlike wired networks, which are typically contained within an organization's secured and protected buildings, the elements of a wireless network (e.g., wireless Access points [ "Access points, APs" ]) may be dispersed throughout the organization's buildings.
One major threat to wireless network security is a malicious AP. A rogue AP is an unauthorized AP that allows a third party to access an organization's network without permission from the organization. For example, a rogue AP may be installed for malicious purposes (e.g., to gain access to data stored on an organization on a network).
Disclosure of Invention
In view of this, embodiments of the present invention provide a wireless scanning method, a network device, and a computer-readable storage medium, which are used to efficiently scan a malicious AP.
The wireless scanning method provided in the embodiment of the invention comprises the following steps: scanning a plurality of channels to acquire channel information of each channel in the plurality of channels; judging whether a target channel accessed to illegal equipment exists according to the channel information of each channel in the plurality of channels; configuring a first scanning strategy according to the target channel: when the target channels are multiple, giving weight to each target channel according to the channel information of each target channel; configuring the first scanning strategy according to the weight corresponding to each target channel; and executing the scanning operation of the next period according to at least the first scanning strategy.
The network device provided in the embodiment of the present invention includes: the device comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the computer program is used for scanning a plurality of channels by the processor to acquire channel information of each channel in the plurality of channels; judging whether a target channel accessed to illegal equipment exists or not according to the channel information of each channel in the plurality of channels; configuring a first scanning strategy according to the target channel: when the target channels are multiple, giving weight to each target channel according to the channel information of each target channel; configuring the first scanning strategy according to the weight corresponding to each target channel; and executing the scanning operation of the next period according to at least the first scanning strategy.
The computer-readable storage medium provided in the embodiments of the present invention stores thereon a computer program, which, when executed by a processor, implements the steps of the above-described wireless scanning method.
The wireless scanning method, the network device and the computer readable storage medium in the embodiment of the invention can adaptively adjust the scanning strategy and improve the efficiency of scanning illegal equipment (such as malicious AP).
Drawings
Fig. 1 is a diagram of an application scenario of a wireless scanning method according to an embodiment of the present invention.
Fig. 2 is a flowchart illustrating a wireless scanning method according to a first embodiment of the present invention.
FIG. 3 is a flowchart illustrating a wireless scanning method according to a second embodiment of the present invention.
FIG. 4 is a diagram illustrating the scan dwell time of a wireless scanning method according to a third embodiment of the present invention.
Fig. 5 is a flowchart of a network device according to a fourth embodiment of the invention.
FIG. 6 is a block diagram of a network device according to a fifth embodiment of the present invention.
Description of the main elements
Network device 100
Illegal device 200
Memory 10
Processor 20
Scanning module 30
Judging module 40
Policy configuration module 50
Update module 60
The following specific embodiments will further illustrate the invention in conjunction with the above-described figures.
Detailed Description
Example 1
Fig. 1 is a diagram illustrating an application scenario of a wireless scanning method according to an embodiment of the present invention. Fig. 2 is a flowchart illustrating steps of a wireless scanning method according to an embodiment of the invention. It is to be understood that the flow charts in the embodiments of the present method are not intended to limit the order in which the steps are performed. The following description is made by taking a network device 100 (e.g., AP) as an execution subject. The details are as follows.
Step S100, scanning a plurality of channels, and acquiring channel information of each of the plurality of channels. In this embodiment, the multiple channels may be all legal channels under a certain communication protocol in a local area, such as legal channels based on an 802.11ac protocol.
Step S110, determining whether there is a target channel for accessing an illegal device according to the channel information of each of the plurality of channels. In this embodiment, the channel information includes number information and distance information of the corresponding channel access illegal device. The AP 200 is an illegal device as shown in fig. 1.
And step S120, configuring a first scanning strategy according to the target channel.
Step S120a, when the target channel is one, configuring the first scanning strategy to configure the target channel to an optimal order in a scanning cycle.
Step S120b, when there are multiple target channels, assigning a weight to each target channel according to the channel information of each target channel; and configuring the first scanning strategy according to the weight corresponding to each target channel.
In an embodiment, the configuring the first scanning strategy comprises: and sequentially configuring the scanning order of each target channel from front to back according to the weight corresponding to each target channel from large to small.
The weight calculation formula of each target channel is the same, and the weight calculation formula is as follows:
Figure BDA0001616142450000031
wherein the content of the first and second substances,
Figure BDA0001616142450000032
illegal devices pa respectively accessed to the channel p 1 ~pa n RSSI value of, said W P The weight corresponding to the channel p.
For example, Wi-Fi can work in 14 channels, the AP 100 is using channel 1 as a service channel to communicate with a client, channels 2 to 14 are not used, illegal devices are accessed in channels 2 and 5, and weight is calculated to obtain W 2 Is 0.6, W 5 At 0.4, the scanning strategy needs to be adjusted to insert channel 2 into the optimal order in the scanning period and channel 5 into the sub-optimal order in the scanning period.
Step S130, executing a scanning operation of a next period according to at least the first scanning strategy.
Example 2
This embodiment is used to configure a first scanning strategy and a second scanning strategy simultaneously, where the second scanning strategy is to set and adjust the scanning Dwell Time (DT) of each channel.
In this embodiment, the AP 100 is communicating with a ue using a channel, which is called a service channel. Fig. 3 is a flowchart illustrating steps of a wireless scanning method according to an embodiment of the invention. The details are as follows.
Step S200, performing a scanning operation on a plurality of channels, and acquiring channel information of each of the plurality of channels, wherein a part of the plurality of channels is pre-recorded in a favorite channel list.
During the scanning process, the DT for each channel recorded in the preferred channel list is greater than the DT for each channel not recorded in the preferred channel list.
In the present embodiment, the main execution subject of the embodiment is a network device, such as the AP 100. The AP 100 is connected to a WLAN controller that can acquire the channels served by all legitimate APs, which are defined and stored in a preferred channel list provided to the AP 100. In another embodiment, the list of favorite channels may be user defined and selected.
Step S210, determining whether there is a target channel accessed to the illegal device according to the channel information of each of the plurality of channels.
In step S220, if the target channel is not pre-recorded in the favorite channel list, the favorite channel list is updated to include the target channel.
Step S230, configuring a first scanning strategy according to the target channel. Refer specifically to step S120.
Step S240, configuring a second scanning strategy according to the channel utilization rate of the service channel and/or the updated favorite channel list. And configuring the scanning stay time of the rest channels in the plurality of channels according to the channel utilization rate of the service channel. Wherein the remaining channels include channels recorded in the preferred channel list and channels not recorded in the preferred channel list, and a DT corresponding to each channel recorded in the preferred channel list is greater than a DT corresponding to each channel not recorded in the preferred channel list.
Specifically, the AP 100 may detect the service channel through Virtual Carrier Sensing (VCS)A channel utilization, switching its operating state and determining the DT of each of the plurality of channels accordingly. For example, DT is set to DT when channel utilization is greater than 70% (including endpoints) l (300ms) and setting DT to DT between 30-70% (excluding both endpoints) m (200ms), setting DT to DT when channel utilization is less than 30% (including endpoints) h (100 ms). Wherein channels recorded in the favorite channel list may have longer DTs.
For example, as shown in fig. 4, Wi-Fi can operate in 14 channels, AP 100 is using channel 1 as a service channel to communicate with a client, and channels 2 to 14 are not used, where channels 2, 5, and 8 are recorded in a favorite channel list, and DT of channels 2 to 14 can be determined according to channel utilization of channel 1 when DT is configured, where channels 2, 5, and 8 can be configured with longer DT compared to other channels in channels 2 to 14.
Step S250, executing a scanning operation of a next period according to at least the first scanning strategy and the second scanning strategy.
Example 3
The present embodiment is used to configure the third scanning strategy, i.e., the number of times each target channel is scanned in a single cycle.
The present embodiment is different from embodiments 1 and 2 in that, for the steps before step S130 in embodiment 1 and step S250 in embodiment 2, the present embodiment further includes the following specific steps of configuring a third scanning strategy:
and configuring the scanned times of each target channel in a single period according to the number of the channels of the plurality of channels and the number of the target channels.
For example, Wi-Fi may operate in 14 channels, an AP 100 is using channel 1 as a service channel to communicate with a client, and channels 2 to 14 are not used, where channels 2, 5, and 8 are target channels, scanning channels 1 to 14 is referred to as a scanning period, and channels 2, 5, and 8 may participate in multiple scans in the scanning period.
Each target channelNumber of times of scanning F in a single cycle p Reference may be made to the following:
Figure BDA0001616142450000051
N p is the number of channels of the target channel, N r For the legal channel number (for example, Wi-Fi is 14) under a certain communication protocol in the local area, alpha is more than or equal to 0.2 and less than or equal to 0.5, and alpha can be selected to a determined value in the range by a user.
It should be noted that the first scanning strategy, the second scanning strategy and the third scanning strategy can be used individually or simultaneously as the basis for executing the scanning operation of the next period.
Example 4
Please refer to fig. 5, which is a block diagram of a network device according to an embodiment of the present invention. The network device 100 may be a Router (Router), a signal Extender (Extender), a Repeater (Repeater), a Gateway (Gateway), or other Access Point (AP) with wireless network functions. The network device may be used to connect clients, other APs, and the like. The network device may be partitioned into one or more modules, each of which is stored in the memory 10 and executed by one or more processors (in this embodiment, a processor 20) to implement the present invention.
The memory 10 includes at least one type of readable storage medium including a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. The processor 20 may be a Central Processing Unit (CPU), a controller, a microcontroller, a microprocessor, or other data Processing chip.
The Processor 20 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. The general purpose processor may be a microprocessor or the processor may be any conventional processor or the like that is the control center for the network device and that connects the various parts of the overall network device using various interfaces and lines.
In this embodiment, the plurality of modules of the network device 100 may include a scanning module 30, a determining module 40, and a policy configuring module 50. The modules 30-50 are configured to be executed by one or more processors (processor 20 in this embodiment) to implement embodiments of the present invention. The modules named in the embodiment of the invention are computer program segments for completing a specific function. The memory 10 is used for storing data such as program codes of the computer program segments.
The scanning module 30 is configured to perform a scanning operation on a plurality of channels, and acquire channel information of each of the plurality of channels. The channel information comprises the quantity information and the distance information of the illegal equipment accessed by the corresponding channel.
The judging module 40 is configured to judge whether there is a target channel accessing an illegal device according to channel information of each of the multiple channels.
A policy configuration module 50, configured to configure a first scanning policy according to the target channel:
when the target channels are multiple, giving weight to each target channel according to the channel information of each target channel; and configuring the first scanning strategy according to the weight corresponding to each target channel.
The configuring the first scanning strategy comprises: and sequentially configuring the scanning order of each target channel from front to back according to the weight corresponding to each target channel from large to small.
The weight calculation formula of each target channel is the same, and the weight calculation formula is as follows:
Figure BDA0001616142450000071
wherein the content of the first and second substances,
Figure BDA0001616142450000072
illegal devices pa respectively accessed by the channel p 1 ~pa n Is/are as follows
RSSI value, said W P The weight corresponding to the channel p.
The scanning module 30 is further configured to execute a scanning operation of a next period according to at least the first scanning strategy.
Example 5
Fig. 6 is a block diagram of a network device according to an embodiment of the invention.
The scanning module 30 is configured to perform a scanning operation on a plurality of channels to obtain channel information of each of the plurality of channels, where a part of the plurality of channels is pre-recorded in a favorite channel list.
The judging module 40 is configured to judge whether there is a target channel accessing an illegal device according to channel information of each of the multiple channels.
An updating module 60, configured to update the favorite channel list to include the target channel if the target channel is not pre-recorded in the favorite channel list.
A policy configuration module 50, configured to configure a first scanning policy according to the target channel: when the target channels are multiple, giving weight to each target channel according to the channel information of each target channel; and configuring the first scanning strategy according to the weight corresponding to each target channel.
The policy configuration module 50 is further configured to: configuring a second scanning strategy according to the channel utilization rate of the service channel and/or the updated favorite channel list: and configuring the scanning stay time of the rest channels in the plurality of channels according to the channel utilization rate of the service channel. Wherein the remaining channels include channels recorded in the preferred channel list and channels not recorded in the preferred channel list, and the scanning dwell time corresponding to each channel recorded in the preferred channel list is greater than the scanning dwell time corresponding to each channel not recorded in the preferred channel list.
The scanning module 30 is further configured to execute a scanning operation of a next period according to at least the first scanning strategy and the second scanning strategy.
Example 6
In this embodiment, the AP 100 is using a channel, called a service channel, to communicate with a ue. The present embodiment may refer to embodiment 4 and embodiment 5, and is different from embodiment 4 and embodiment 5 in that the policy configuration module of the present embodiment further configures a third scanning policy. The method comprises the following specific steps:
the policy configuration module 50 is further configured to configure the number of times each target channel is scanned in a single cycle according to the number of channels of the plurality of channels and the number of channels of the target channel.
It should be noted that, for details of embodiments 4 to 6, reference may be made to embodiments 1 to 3, and repeated description is not repeated herein.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is used as an example, in practical applications, the above-mentioned function distribution may be performed by different functional units or modules according to needs, that is, the internal structure of the storage device is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit, and the integrated unit may be implemented in a form of hardware, or may be implemented in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application.
The modules/units integrated by the network device apparatus may be stored in a computer-readable storage medium if they are implemented in the form of software functional units and sold or used as separate products. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, U.S. disk, removable hard disk, magnetic diskette, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signal, telecommunications signal, and software distribution medium, etc. It should be noted that the computer-readable medium may contain suitable additions or subtractions depending on the requirements of legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer-readable media may not include electrical carrier signals or telecommunication signals in accordance with legislation and patent practice.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention, and all equivalent structures or equivalent processes performed by the present invention or directly or indirectly applied to other related technical fields are also included in the scope of the present invention.

Claims (11)

1. A method of wireless scanning, the method comprising:
scanning a plurality of channels to acquire channel information of each channel in the plurality of channels, wherein part of the channels in the plurality of channels are recorded in a favorite channel list in advance;
judging whether a target channel accessed to illegal equipment exists or not according to the channel information of each channel in the plurality of channels;
when a target channel accessed to illegal equipment is judged, judging whether the target channel is recorded in the favorite channel list in advance;
when the target channel is not pre-recorded in the favorite channel list, updating the favorite channel list to include the target channel;
configuring a first scanning strategy according to the target channel, wherein,
when the target channel is one, configuring the first scanning strategy to configure the target channel to an optimal order in a scanning period;
when a plurality of target channels are available, giving a weight to each target channel according to the information of the accessed illegal equipment of each target channel; configuring the first scanning strategy according to the weight corresponding to each target channel;
when one of the plurality of channels is a service channel, configuring a second scanning strategy configuration according to the channel utilization rate of the service channel and the preferred channel list, wherein the second scanning strategy configuration is configured to configure scanning stay time of the rest channels in the plurality of channels according to the channel utilization rate of the service channel, wherein the rest channels comprise channels recorded in the preferred channel list and channels not recorded in the preferred channel list, and the scanning stay time corresponding to each channel recorded in the preferred channel list is greater than the scanning stay time corresponding to each channel not recorded in the preferred channel list; and
and executing the scanning operation of the next period according to at least the first scanning strategy and the second scanning strategy.
2. The wireless scanning method of claim 1, wherein said configuring a first scanning strategy comprises:
and sequentially configuring the scanning order of each target channel from large to small according to the weight corresponding to each target channel.
3. The wireless scanning method of claim 1, wherein the channel information includes information on the number of illegal devices accessed by the corresponding channel and distance information.
4. The wireless scanning method of claim 1, wherein in the step of assigning a weight to each of the target channels, the weight calculation formula of each of the target channels is the same, and the weight calculation formula is as follows:
Figure FDA0003637201830000021
wherein the content of the first and second substances,
Figure FDA0003637201830000022
illegal devices pa respectively accessed by the channel p 1 ~pa n The Wp is a weight corresponding to the channel p.
5. The wireless scanning method of claim 1, further comprising configuring a third scanning strategy to:
and configuring the scanned times of each target channel in a single period according to the number of the channels of the plurality of channels and the number of the channels of the target channel.
6. A network device, wherein the network device comprises: a memory, a processor, and a computer program stored on the memory and executable on the processor, the computer program being executed by the processor to implement the steps of:
scanning a plurality of channels to acquire channel information of each channel in the plurality of channels, wherein part of the channels in the plurality of channels are recorded in a favorite channel list in advance;
judging whether a target channel accessed to illegal equipment exists according to the channel information of each channel in the plurality of channels;
when a target channel accessed to illegal equipment is judged, judging whether the target channel is recorded in the favorite channel list in advance;
when the target channel is not pre-recorded in the favorite channel list, updating the favorite channel list to include the target channel;
configuring a first scanning strategy according to the target channel, wherein,
when the target channel is one, configuring the first scanning strategy to configure the target channel to an optimal order in a scanning period;
when a plurality of target channels are available, giving a weight to each target channel according to the information of the accessed illegal equipment of each target channel; configuring the first scanning strategy according to the weight corresponding to each target channel;
when one of the plurality of channels is a service channel, configuring a second scanning strategy configuration according to the channel utilization rate of the service channel and the preferred channel list, wherein the second scanning strategy configuration is configured to configure scanning stay time of the rest channels in the plurality of channels according to the channel utilization rate of the service channel, wherein the rest channels comprise channels recorded in the preferred channel list and channels not recorded in the preferred channel list, and the scanning stay time corresponding to each channel recorded in the preferred channel list is greater than the scanning stay time corresponding to each channel not recorded in the preferred channel list; and
and executing the scanning operation of the next period according to at least the first scanning strategy and the second scanning strategy.
7. The network apparatus of claim 6, wherein the configuring the first scanning policy comprises:
and sequentially configuring the scanning order of each target channel from large to small according to the weight corresponding to each target channel.
8. The network apparatus of claim 6, wherein the channel information comprises information on the number of illegal devices accessed by the corresponding channel and distance information.
9. The network apparatus of claim 6, wherein in the step of assigning the weight to each target channel, the weight calculation formula of each target channel is the same, and the weight calculation formula is as follows:
Figure FDA0003637201830000031
wherein the content of the first and second substances,
Figure FDA0003637201830000032
illegal devices pa respectively accessed by the channel p 1 ~pa n The Wp is a weight corresponding to the channel p.
10. The network apparatus of claim 6, further comprising configuring a third scanning policy to:
and configuring the scanned times of each target channel in a single period according to the number of the channels of the plurality of channels and the number of the target channels.
11. A computer-readable storage medium, characterized in that a computer program is stored thereon, which, when being executed by a processor, carries out the steps of the wireless scanning method according to any one of claims 1 to 5.
CN201810286444.4A 2018-03-30 2018-03-30 Wireless scanning method, network device and computer readable storage medium Active CN110324832B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810286444.4A CN110324832B (en) 2018-03-30 2018-03-30 Wireless scanning method, network device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810286444.4A CN110324832B (en) 2018-03-30 2018-03-30 Wireless scanning method, network device and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN110324832A CN110324832A (en) 2019-10-11
CN110324832B true CN110324832B (en) 2022-09-27

Family

ID=68112093

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810286444.4A Active CN110324832B (en) 2018-03-30 2018-03-30 Wireless scanning method, network device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110324832B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113630780B (en) * 2021-08-11 2024-04-16 迈普通信技术股份有限公司 Countering method for illegal wireless access point

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102349334A (en) * 2009-03-12 2012-02-08 高通股份有限公司 Scanning channels while a device is out of service
CN105264828A (en) * 2013-11-20 2016-01-20 华为技术有限公司 Channel scan method and apparatus
CN106686692A (en) * 2017-01-13 2017-05-17 广东欧珀移动通信有限公司 Channel scanning method and terminal device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101123552B (en) * 2007-09-20 2010-10-06 杭州华三通信技术有限公司 An access point and wireless scanning method for this access point
CN103888949A (en) * 2012-12-19 2014-06-25 杭州华三通信技术有限公司 Illegal AP prevention method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102349334A (en) * 2009-03-12 2012-02-08 高通股份有限公司 Scanning channels while a device is out of service
CN105264828A (en) * 2013-11-20 2016-01-20 华为技术有限公司 Channel scan method and apparatus
CN106686692A (en) * 2017-01-13 2017-05-17 广东欧珀移动通信有限公司 Channel scanning method and terminal device

Also Published As

Publication number Publication date
CN110324832A (en) 2019-10-11

Similar Documents

Publication Publication Date Title
US20120115442A1 (en) Secure subscriber identity module service
US20060003796A1 (en) Method and apparatus to provide tiered wireless network access
JP7388464B2 (en) First network device and method for the first network device
EP3122144A1 (en) Device and method for accessing wireless network
CN112437456A (en) Communication method and device in non-public network
RU2760869C1 (en) Method for terminal information transmission and corresponding products
US10575180B2 (en) Securing identities of chipsets of mobile devices
WO2019210461A1 (en) Wireless network service access control with subscriber identity protection
US11805416B2 (en) Systems and methods for multi-link device privacy protection
WO2017008580A1 (en) Method and device for wireless station to access local area network
EP4247050A1 (en) Network slice connection method and apparatus, storage medium, and electronic apparatus
US20240007834A1 (en) Imei binding and dynamic imei provisioning for wireless devices
US11317277B2 (en) Method, device and system for secure connection in wireless communications networks
WO2022098423A1 (en) Smart computing device implementing network security and data arbitration
CN108881113B (en) Network connection control method and device
CN110324832B (en) Wireless scanning method, network device and computer readable storage medium
CN113055982B (en) Network access method, network access device and mobile terminal
CN112399398B (en) Selecting different profiles for different network interfaces for communication of an electronic device
US20060121884A1 (en) System and method for limiting a wireless communication device to a specified geographic zone
CN112219442A (en) Network access method, terminal equipment and network equipment
US8971879B2 (en) Mobile communication method and network apparatus
CN115250264B (en) Controlling network traffic associated with domain names based on DNS-IP mapping
CN108076009B (en) Resource sharing method, device and system
CN109327517A (en) Obtain the method and apparatus of wireless access point network state
CN106714177B (en) Method for distinguishing wireless hotspots with same name and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 530033 plant B of Foxconn Nanning science and Technology Park, No. 51 Tongle Avenue, Jiangnan District, Nanning City, Guangxi Zhuang Autonomous Region

Applicant after: Nanning Fulian Fugui Precision Industry Co.,Ltd.

Address before: 530007 the Guangxi Zhuang Autonomous Region Nanning hi tech Zone headquarters road 18, China ASEAN enterprise headquarters three phase 5 factory building

Applicant before: NANNING FUGUI PRECISION INDUSTRIAL Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant