CN117641355A - Network access method, system, equipment, storable medium and communication method - Google Patents
Network access method, system, equipment, storable medium and communication method Download PDFInfo
- Publication number
- CN117641355A CN117641355A CN202311593836.2A CN202311593836A CN117641355A CN 117641355 A CN117641355 A CN 117641355A CN 202311593836 A CN202311593836 A CN 202311593836A CN 117641355 A CN117641355 A CN 117641355A
- Authority
- CN
- China
- Prior art keywords
- access point
- encrypted
- data
- security level
- verified
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 53
- 238000004891 communication Methods 0.000 title claims abstract description 15
- 238000012795 verification Methods 0.000 claims description 26
- 238000004590 computer program Methods 0.000 claims description 10
- 238000013507 mapping Methods 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 description 5
- 238000011161 development Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a network access method, a system, equipment, a storable medium and a communication method, wherein a network access request is sent to a first access point, the network access request comprises data to be encrypted, the security level of terminal equipment and the identifier of a second access point corresponding to the terminal equipment, the data to be encrypted is determined according to the security level of the terminal equipment and the security level of the first access point, a suspicious terminal can be prevented from being accessed to the first access point, and further, the suspicious terminal is prevented from attacking other terminals, and the network security is improved; meanwhile, when the first access point is the target first access point, a device authentication request is sent to the second access point according to the identification of the second access point, after the authentication is passed, the first access point directly provides network access service for the terminal, all information does not need to pass through other access points, communication efficiency is high, and user experience is good.
Description
Technical Field
The present invention relates to the field of network communications technologies, and in particular, to a network access method, a system, a device, a storable medium, and a communication method.
Background
With the development of economy and technology, devices such as routers, switches and the like have been increasingly used, and routers, switches and the like are used as wireless APs (Access points), and can provide network Access services for terminals with Access passwords (or Wi-Fi passwords) for accessing Wi-Fi signals (or Access points) within coverage areas of Wi-Fi signals released by the routers, switches and the like, so that the terminals can Access networks, such as home routers (also referred to as home Wi-Fi) installed in each home, and can provide network Access services for terminals with Wi-Fi passwords for the home Wi-Fi.
When the terminal moves to an area which cannot be covered by Wi-Fi signals released by home Wi-Fi signals, the terminal can search for a plurality of other Wi-Fi signals, but the terminal cannot access the network through the Wi-Fi signals due to the fact that access passwords corresponding to the Wi-Fi signals are not accessed, and meanwhile, the terminal is in an area which cannot be covered by home Wi-Fi signals, although the home Wi-Fi signals may be in an idle state, the terminal cannot access the network through the home Wi-Fi signals, so that user experience is poor.
Disclosure of Invention
In view of this, the present invention provides a network access method, system, device, storable medium and communication method, which can solve the defect of poor user experience in the prior art.
The technical scheme of the invention is realized as follows:
the network access method specifically comprises the following steps:
sending a network access request to a first access point, wherein the network access request comprises data to be encrypted, the security level of terminal equipment and the identifier of a second access point corresponding to the terminal equipment, and the data to be encrypted is determined according to the security level of the terminal equipment and the security level of the first access point;
when the first access point is a target first access point, sending a device authentication request to the second access point according to the identifier of the second access point, wherein the device authentication request comprises encryption data to be verified and the security level of terminal equipment, the encryption data to be verified is obtained by encrypting the encryption data to be encrypted according to an encryption key, and the encryption key is determined according to a first random number and a second random number provided by the second access point;
and verifying the encrypted data to be verified according to the received security level of the terminal equipment, and providing network access service for the terminal equipment according to a verification result.
As a further alternative of the network access method, the determining, by the data to be encrypted, according to the security level of the terminal device and the security level of the first access point specifically includes:
the data to be encrypted is determined according to the difference value between the security level of the terminal equipment and the security level of the first access point;
if the difference value is greater than or equal to zero, positively calling data corresponding to the absolute value of the difference value from a data table to be encrypted as data to be encrypted;
and if the difference value is smaller than zero, reversely calling the data corresponding to the absolute value of the difference value from the data table to be encrypted as the data to be encrypted.
As a further alternative of the network access method, the method for determining the first access point as the target first access point includes:
acquiring a first random number and a second random number;
determining an encryption key corresponding to the first random number from a preset data table to be encrypted;
encrypting the second random number by using the encryption key to obtain an encrypted random number;
determining a plurality of encryption keys to be verified corresponding to the first random number from a preset trusted data table to be encrypted, wherein the trusted data table to be encrypted is used for storing the mapping relation between the security level of a trusted associated access point and the encryption keys;
encrypting the encrypted random number by using the encryption key to be verified to obtain the random number to be verified;
and when the random number to be verified is consistent with the second random number, determining that the first access point is a target first access point, and the security level corresponding to the random number to be verified is the security level of the target first access point.
As a further alternative of the network access method, the verifying the encrypted data to be verified according to the received security level of the terminal device specifically includes:
and verifying the encrypted data to be verified according to the received security level of the terminal equipment, the known security level of the first access point and the known encryption key of the first access point.
As a further alternative of the network access method, the verifying the encrypted data to be verified according to the received security level of the terminal device, the known security level of the first access point and the known encryption key of the first access point specifically includes:
determining data to be verified according to the received security level of the terminal equipment and the known security level of the first access point;
and encrypting the data to be verified by using the known security key of the first access point to obtain encrypted verification data.
As a further alternative of the network access method, the providing, according to the verification result, a network access service for the terminal device specifically includes:
and when the encrypted verification data is consistent with the encrypted data to be verified, the verification is passed, and network access service is provided for the terminal equipment.
A network access system, comprising:
the terminal equipment is used for sending a network access request to the first access point, wherein the network access request comprises data to be encrypted, the security level of the terminal equipment and the identifier of a second access point corresponding to the terminal equipment, and the data to be encrypted is determined according to the security level of the terminal equipment and the security level of the first access point;
the first access point is used for sending a device authentication request to the second access point according to the identifier of the second access point when the first access point is a target first access point, wherein the device authentication request comprises to-be-verified encrypted data and the security level of the terminal device, the to-be-verified encrypted data is obtained by encrypting the to-be-encrypted data by an encryption key, and the encryption key is determined according to a first random number and a second random number provided by the second access point;
and the second access point is used for verifying the encrypted data to be verified according to the received security level of the terminal equipment and providing network access service for the terminal equipment according to a verification result.
A network access device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of any one of the network access methods described above when the computer program is executed.
A readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of any of the above network access methods.
A communication method employing the steps of any one of the above network access methods.
The beneficial effects of the invention are as follows: the network access request is sent to the first access point, the network access request comprises data to be encrypted, the security level of the terminal equipment and the identifier of the second access point corresponding to the terminal equipment, the data to be encrypted is determined according to the security level of the terminal equipment and the security level of the first access point, the suspicious terminal can be prevented from accessing the first access point, further the suspicious terminal is prevented from attacking other terminals, and network security is improved; meanwhile, when the first access point is the target first access point, a device authentication request is sent to the second access point according to the identifier of the second access point, the device authentication request comprises encrypted data to be verified and the security level of the terminal device, the encrypted data to be verified is obtained by encrypting the encrypted data by an encryption key, the encryption key is determined according to a first random number and a second random number provided by the second access point, the encrypted data to be verified is verified according to the received security level of the terminal device, network access service is provided for the terminal device according to the verification result, the first access point can directly provide network access service for the terminal device after passing verification, all information does not need to pass through other access points, communication efficiency is high, and user experience is good.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a network access method according to an embodiment of the present invention;
fig. 2 is a sub-flowchart of a network access method according to an embodiment of the present invention;
fig. 3 is another sub-flowchart of a network access method according to an embodiment of the present invention;
fig. 4 is another sub-flowchart of a network access method according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a network access system according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a network access device according to an embodiment of the present invention.
Detailed Description
The following description of the technical solutions in the embodiments of the present invention will be clear and complete, and it is obvious that the described embodiments are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In some related technologies, a visitor mode is set in an access point device to provide network access service for a terminal without an access code corresponding to the access point, and the terminal can access the access code of the access point only through identity verification to obtain the network access service provided by the access point.
However, with the development of the darkness guest technology, a hacker can steal the privacy of a terminal user by monitoring the data communication performed by the terminal of an access point such as an access router, a switch and the like; even the user can be hijacked to access the fishing hot spot, and the traffic hijacking, the tampering and the like are realized.
A vulnerability named as "KRACK (Key ReiNstallatioN Attack )" is based on WPA2 security protocol, and an attacker uses a one-time key provided by an access point to a terminal to crack information exchanged between the access point and the terminal to obtain important information such as credit card, chat information, payment password, etc. of a terminal user.
In particular, the access point is an access point releasing Wi-Fi signals for public places, and the access password is known to all public, so that a hacker can crack information exchanged between the access point and the terminal more easily.
In other related technologies, when the terminal moves to an area where the Wi-Fi signal released by the home Wi-Fi cannot cover, the terminal sends information to be sent to the home Wi-F i to the access point corresponding to the other Wi-Fi signal, and the access point corresponding to the other Wi-F i signal sends the received information to the home Wi-F i.
That is, all information needs to be forwarded to the home Wi-F i through other access points, and although the home Wi-F i can provide network access service for the terminal, the communication efficiency is low and the user experience is poor due to the fact that the forwarding of other access points is needed.
Example 1:
referring to fig. 1, the present embodiment provides a method for providing a network access service.
The network may be a wide area internet or a local area network (such as a campus network), and when the network is a local area network, there are at least two access points (such as a router, a switch, etc.) in the coverage area of the network, where the terminal can access the local area network.
The access point of the network may be a router, a switch, etc. specifically, which releases the Wi-F i signal, and the terminal in the coverage area of the Wi-F i signal may access the network by connecting the Wi-F i signal.
A network may have multiple access points, such as for wide area internet, almost all routers are their access points.
The first access point specifically refers to an access point corresponding to a Wi-F i signal currently searched by a terminal needing to access the network, and the terminal does not have an access code (or Wi-F i code) corresponding to the access point, so that the terminal cannot access the network through the access point (or the access point cannot provide network access service for the access point). The second access point means that the terminal has access authority of the access point, and the authority includes but is not limited to a password and a ciphertext.
Specifically, when the access point corresponding to the access code owned by the terminal does not work or the terminal is just out of the coverage range of Wi-F i signals released by the access points, after the terminal searches for other Wi-F i signals, the terminal sends a network access request to the access point corresponding to the searched Wi-F i signals, where the network access request is used for releasing the access point (i.e., the first access point) of the Wi-Fi signals to provide network access service for the access point.
After searching for a plurality of Wi-Fi signals, the terminal may send application information to access points corresponding to the plurality of Wi-Fi signals, where the access points corresponding to the plurality of Wi-Fi signals are all first access points.
Based on the above, the network access method provided by the embodiment of the present invention includes:
step 1, sending a network access request to a first access point, wherein the network access request comprises data to be encrypted, the security level of terminal equipment and the identifier of a second access point corresponding to the terminal equipment, and the data to be encrypted is determined according to the security level of the terminal equipment and the security level of the first access point;
referring to fig. 2, in an embodiment of the present invention, a method for determining data to be encrypted according to a security level of the terminal device and a security level of the first access point includes: the data to be encrypted is determined according to the difference value between the security level of the terminal equipment and the security level of the first access point; if the difference value is greater than or equal to zero, positively calling data corresponding to the absolute value of the difference value from a data table to be encrypted as data to be encrypted; and if the difference value is smaller than zero, reversely calling the data corresponding to the absolute value of the difference value from the data table to be encrypted as the data to be encrypted.
The embodiment of the invention only needs to configure a group of data interfaces to be encrypted between the equipment terminal and the first access point, and the data interfaces are stored in the terminal equipment and the first access point in the form of a data table to be encrypted.
Step 2, when the first access point is a target first access point, sending a device authentication request to the second access point according to the identifier of the second access point, wherein the device authentication request comprises encrypted data to be verified and the security level of terminal equipment, the encrypted data to be verified is obtained by encrypting the data to be encrypted by an encryption key, and the encryption key is determined according to a first random number and a second random number provided by the second access point;
referring to fig. 3, in an embodiment of the present invention, a method for determining that a first access point is a target first access point includes: acquiring a first random number and a second random number; determining an encryption key corresponding to the first random number from a data table to be encrypted; encrypting the second random number by using the encryption key to obtain an encrypted random number; determining a plurality of encryption keys to be verified corresponding to the first random number from a trusted data table to be encrypted, wherein the trusted data table to be encrypted is used for storing the mapping relation between the security level of a trusted associated access point and the encryption keys; encrypting the encrypted random number by using the encryption key to be verified to obtain the random number to be verified; and when the random number to be verified is consistent with the second random number, determining that the first access point is a target first access point, and the security level corresponding to the random number to be verified is the security level of the target first access point.
According to the embodiment of the invention, a plurality of sets of data to be encrypted are configured between the first access node and the second access node, and the target data can be determined according to actual conditions, so that the verification of the first access node is more flexible and reliable.
And step 3, verifying the encrypted data to be verified according to the received security level of the terminal equipment, and providing network access service for the terminal equipment according to a verification result.
Referring to fig. 4, in an embodiment of the present invention, a method for verifying the encrypted data to be verified according to the received security level of the terminal device includes: and verifying the encrypted data to be verified according to the received security level of the terminal equipment, the known security level of the first access point and the known encryption key of the first access point.
In the embodiment of the present invention, the method for verifying the encrypted data to be verified according to the received security level of the terminal device, the known security level of the first access point and the known encryption key of the first access point includes: determining data to be verified according to the received security level of the terminal equipment and the known security level of the first access point; encrypting the data to be verified by using a known security key of the first access point to obtain encrypted verification data; and when the encrypted verification data is consistent with the encrypted data to be verified, the verification is passed, and network access service is provided for the terminal equipment.
The embodiment of the invention can improve the security of network access service by the method for verifying the encrypted data to be verified according to the security level of the terminal equipment. By determining the data to be verified and encrypting the data using the known security key of the first access point, the integrity and security of the data can be ensured. When the encrypted verification data is consistent with the encrypted data to be verified, the verification can be passed and network access service can be provided for the terminal equipment. Thus, unauthorized equipment can be effectively prevented from accessing the network, and the network security is protected.
In summary, an embodiment of the present invention provides a network access method, capable of sending a network access request to a first access point, where the network access request includes data to be encrypted, a security level of a terminal device, and an identifier of a second access point corresponding to the terminal device, where the data to be encrypted is determined according to the security level of the terminal device and the security level of the first access point; when the first access point is a target first access point, sending a device authentication request to the second access point according to the identifier of the second access point, wherein the device authentication request comprises encryption data to be verified and the security level of terminal equipment, the encryption data to be verified is obtained by encrypting the encryption data to be encrypted by an encryption key, and the encryption key is determined according to a first random number and a second random number provided by the second access point; and verifying the encrypted data to be verified according to the received security level of the terminal equipment, and providing network access service for the terminal equipment according to a verification result. By the method for providing the network access service, on one hand, the suspicious first access point can be accessed to the second access point, the suspicious terminal is prevented from accessing the first access point, further, the suspicious terminal is prevented from attacking other terminals, and the network security is improved; on the other hand, after passing the verification, the first access point directly provides network access service for the terminal, all information does not need to pass through other access points, the communication efficiency is high, and the user experience is good.
Example 2:
referring to fig. 5, based on the foregoing embodiment, an embodiment of the present invention further provides a network access system, including:
the terminal equipment is used for sending a network access request to the first access point, wherein the network access request comprises data to be encrypted, the security level of the terminal equipment and the identifier of a second access point corresponding to the terminal equipment, and the data to be encrypted is determined according to the security level of the terminal equipment and the security level of the first access point;
the first access point is used for sending a device authentication request to the second access point according to the identifier of the second access point when the first access point is a target first access point, wherein the device authentication request comprises to-be-verified encrypted data and the security level of the terminal device, the to-be-verified encrypted data is obtained by encrypting the to-be-encrypted data by an encryption key, and the encryption key is determined according to a first random number and a second random number provided by the second access point;
and the second access point is used for verifying the encrypted data to be verified according to the received security level of the terminal equipment and providing network access service for the terminal equipment according to a verification result.
It should be understood that, for the same inventive concept, the network system provided in the embodiment of the present invention and the network device access method provided in the foregoing embodiment, and for the detailed process of each step in the embodiment of the present invention, reference may be made to the foregoing embodiment, and details are not repeated in the embodiment of the present invention.
Example 3:
referring to fig. 6, based on the foregoing inventive concept, an embodiment of the present invention further provides a network access device and a readable storage medium, where the network access device includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor implements the steps of any one of the network access methods described above when executing the computer program, and the readable storage medium stores the computer program thereon, where the computer program implements the steps of any one of the network access methods described above when executed by the processor.
In practical applications, the network access device may be a router, a gateway, or the like, and the specific device is not limited in this embodiment.
Example 4:
based on the above embodiment, the embodiment of the present invention further provides a communication method, where the method applies the steps of any one of the network access methods, including:
sending a network access request to a first access point, wherein the network access request comprises data to be encrypted, the security level of terminal equipment and the identifier of a second access point corresponding to the terminal equipment, and the data to be encrypted is determined according to the security level of the terminal equipment and the security level of the first access point;
when the first access point is a target first access point, sending a device authentication request to the second access point according to the identifier of the second access point, wherein the device authentication request comprises encryption data to be verified and the security level of terminal equipment, the encryption data to be verified is obtained by encrypting the encryption data to be encrypted by an encryption key, and the encryption key is determined according to a first random number and a second random number provided by the second access point;
and verifying the encrypted data to be verified according to the received security level of the terminal equipment, and providing network access service for the terminal equipment according to a verification result so as to realize wireless communication of the terminal equipment.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.
Claims (10)
1. The network access method is characterized by comprising the following steps:
sending a network access request to a first access point, wherein the network access request comprises data to be encrypted, the security level of terminal equipment and the identifier of a second access point corresponding to the terminal equipment, and the data to be encrypted is determined according to the security level of the terminal equipment and the security level of the first access point;
when the first access point is a target first access point, sending a device authentication request to the second access point according to the identifier of the second access point, wherein the device authentication request comprises encryption data to be verified and the security level of terminal equipment, the encryption data to be verified is obtained by encrypting the encryption data to be encrypted according to an encryption key, and the encryption key is determined according to a first random number and a second random number provided by the second access point;
and verifying the encrypted data to be verified according to the received security level of the terminal equipment, and providing network access service for the terminal equipment according to a verification result.
2. The network access method according to claim 1, wherein the data to be encrypted is determined according to the security level of the terminal device and the security level of the first access point, and specifically comprises:
the data to be encrypted is determined according to the difference value between the security level of the terminal equipment and the security level of the first access point;
if the difference value is greater than or equal to zero, positively calling data corresponding to the absolute value of the difference value from a data table to be encrypted as data to be encrypted;
and if the difference value is smaller than zero, reversely calling the data corresponding to the absolute value of the difference value from the data table to be encrypted as the data to be encrypted.
3. The network access method of claim 2, wherein the method of determining the first access point as the target first access point comprises:
acquiring a first random number and a second random number;
determining an encryption key corresponding to the first random number from a preset data table to be encrypted;
encrypting the second random number by using the encryption key to obtain an encrypted random number;
determining a plurality of encryption keys to be verified corresponding to the first random number from a preset trusted data table to be encrypted, wherein the trusted data table to be encrypted is used for storing the mapping relation between the security level of a trusted associated access point and the encryption keys;
encrypting the encrypted random number by using the encryption key to be verified to obtain the random number to be verified;
and when the random number to be verified is consistent with the second random number, determining that the first access point is a target first access point, and the security level corresponding to the random number to be verified is the security level of the target first access point.
4. A network access method according to claim 3, wherein the verifying the encrypted data to be verified according to the received security level of the terminal device specifically comprises:
and verifying the encrypted data to be verified according to the received security level of the terminal equipment, the known security level of the first access point and the known encryption key of the first access point.
5. The network access method according to claim 4, wherein the verifying the encrypted data to be verified according to the received security level of the terminal device, the known security level of the first access point and the known encryption key of the first access point specifically comprises:
determining data to be verified according to the received security level of the terminal equipment and the known security level of the first access point;
and encrypting the data to be verified by using the known security key of the first access point to obtain encrypted verification data.
6. The network access method according to claim 5, wherein the providing the network access service for the terminal device according to the verification result specifically includes:
and when the encrypted verification data is consistent with the encrypted data to be verified, the verification is passed, and network access service is provided for the terminal equipment.
7. A network access system, comprising:
the terminal equipment is used for sending a network access request to the first access point, wherein the network access request comprises data to be encrypted, the security level of the terminal equipment and the identifier of a second access point corresponding to the terminal equipment, and the data to be encrypted is determined according to the security level of the terminal equipment and the security level of the first access point;
the first access point is used for sending a device authentication request to the second access point according to the identifier of the second access point when the first access point is a target first access point, wherein the device authentication request comprises to-be-verified encrypted data and the security level of the terminal device, the to-be-verified encrypted data is obtained by encrypting the to-be-encrypted data by an encryption key, and the encryption key is determined according to a first random number and a second random number provided by the second access point;
and the second access point is used for verifying the encrypted data to be verified according to the received security level of the terminal equipment and providing network access service for the terminal equipment according to a verification result.
8. A network access device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the network access method of any of claims 1-6 when the computer program is executed.
9. A readable storage medium, characterized in that the storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of the network access method of any of claims 1-6.
10. A communication method, characterized in that the method uses the steps of the network access method according to any one of claims 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311593836.2A CN117641355A (en) | 2023-11-27 | 2023-11-27 | Network access method, system, equipment, storable medium and communication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311593836.2A CN117641355A (en) | 2023-11-27 | 2023-11-27 | Network access method, system, equipment, storable medium and communication method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117641355A true CN117641355A (en) | 2024-03-01 |
Family
ID=90019343
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311593836.2A Pending CN117641355A (en) | 2023-11-27 | 2023-11-27 | Network access method, system, equipment, storable medium and communication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117641355A (en) |
-
2023
- 2023-11-27 CN CN202311593836.2A patent/CN117641355A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2546610C1 (en) | Method of determining unsafe wireless access point | |
US8320883B2 (en) | Method to dynamically authenticate and control mobile devices | |
US7913080B2 (en) | Setting information distribution apparatus, method, program, and medium, authentication setting transfer apparatus, method, program, and medium, and setting information reception program | |
US7783756B2 (en) | Protection for wireless devices against false access-point attacks | |
CN110324287A (en) | Access authentication method, device and server | |
EP1873998B1 (en) | Identifiers in a communication system | |
US20060114863A1 (en) | Method to secure 802.11 traffic against MAC address spoofing | |
US20040090930A1 (en) | Authentication method and system for public wireless local area network system | |
US20100106966A1 (en) | Method and System for Registering and Verifying the Identity of Wireless Networks and Devices | |
US20090029677A1 (en) | Mobile authentication through strengthened mutual authentication and handover security | |
CN111885604B (en) | Authentication method, device and system based on heaven and earth integrated network | |
KR20150053912A (en) | Method and devices for registering a client to a server | |
CN105657702A (en) | Authentication method, authentication system, authentication method of mobile terminal and mobile terminal | |
CN105763517A (en) | Router security access and control method and system | |
US11202192B2 (en) | Registering user equipment with a visited public land mobile network | |
Gui et al. | A new authentication rfid protocol with ownership transfer | |
CN101610509B (en) | Method, device and system for protecting communication security | |
CN117641355A (en) | Network access method, system, equipment, storable medium and communication method | |
Bocan et al. | Threats and Countermeasures in GSM Networks. | |
CN112399416B (en) | Access method and device | |
WO2022067627A1 (en) | A method for preventing leakage of authentication sequence number of a mobile terminal | |
Lee et al. | Man-in-the-middle Attacks Detection Scheme on Smartphone using 3G network | |
KR100968522B1 (en) | Mobile Authentication Method for Strengthening the Mutual Authentication and Handover Security | |
CN113316141B (en) | Wireless network access method, sharing server and wireless access point | |
CN113316139B (en) | Wireless network access method and wireless access point |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |