CN117641355A - Network access method, system, equipment, storable medium and communication method - Google Patents

Network access method, system, equipment, storable medium and communication method Download PDF

Info

Publication number
CN117641355A
CN117641355A CN202311593836.2A CN202311593836A CN117641355A CN 117641355 A CN117641355 A CN 117641355A CN 202311593836 A CN202311593836 A CN 202311593836A CN 117641355 A CN117641355 A CN 117641355A
Authority
CN
China
Prior art keywords
access point
encrypted
data
security level
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311593836.2A
Other languages
Chinese (zh)
Inventor
张世英
黄琦龙
马骁
杨宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Eracom Contracting And Engineering Co ltd
Original Assignee
China Eracom Contracting And Engineering Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Eracom Contracting And Engineering Co ltd filed Critical China Eracom Contracting And Engineering Co ltd
Priority to CN202311593836.2A priority Critical patent/CN117641355A/en
Publication of CN117641355A publication Critical patent/CN117641355A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a network access method, a system, equipment, a storable medium and a communication method, wherein a network access request is sent to a first access point, the network access request comprises data to be encrypted, the security level of terminal equipment and the identifier of a second access point corresponding to the terminal equipment, the data to be encrypted is determined according to the security level of the terminal equipment and the security level of the first access point, a suspicious terminal can be prevented from being accessed to the first access point, and further, the suspicious terminal is prevented from attacking other terminals, and the network security is improved; meanwhile, when the first access point is the target first access point, a device authentication request is sent to the second access point according to the identification of the second access point, after the authentication is passed, the first access point directly provides network access service for the terminal, all information does not need to pass through other access points, communication efficiency is high, and user experience is good.

Description

Network access method, system, equipment, storable medium and communication method
Technical Field
The present invention relates to the field of network communications technologies, and in particular, to a network access method, a system, a device, a storable medium, and a communication method.
Background
With the development of economy and technology, devices such as routers, switches and the like have been increasingly used, and routers, switches and the like are used as wireless APs (Access points), and can provide network Access services for terminals with Access passwords (or Wi-Fi passwords) for accessing Wi-Fi signals (or Access points) within coverage areas of Wi-Fi signals released by the routers, switches and the like, so that the terminals can Access networks, such as home routers (also referred to as home Wi-Fi) installed in each home, and can provide network Access services for terminals with Wi-Fi passwords for the home Wi-Fi.
When the terminal moves to an area which cannot be covered by Wi-Fi signals released by home Wi-Fi signals, the terminal can search for a plurality of other Wi-Fi signals, but the terminal cannot access the network through the Wi-Fi signals due to the fact that access passwords corresponding to the Wi-Fi signals are not accessed, and meanwhile, the terminal is in an area which cannot be covered by home Wi-Fi signals, although the home Wi-Fi signals may be in an idle state, the terminal cannot access the network through the home Wi-Fi signals, so that user experience is poor.
Disclosure of Invention
In view of this, the present invention provides a network access method, system, device, storable medium and communication method, which can solve the defect of poor user experience in the prior art.
The technical scheme of the invention is realized as follows:
the network access method specifically comprises the following steps:
sending a network access request to a first access point, wherein the network access request comprises data to be encrypted, the security level of terminal equipment and the identifier of a second access point corresponding to the terminal equipment, and the data to be encrypted is determined according to the security level of the terminal equipment and the security level of the first access point;
when the first access point is a target first access point, sending a device authentication request to the second access point according to the identifier of the second access point, wherein the device authentication request comprises encryption data to be verified and the security level of terminal equipment, the encryption data to be verified is obtained by encrypting the encryption data to be encrypted according to an encryption key, and the encryption key is determined according to a first random number and a second random number provided by the second access point;
and verifying the encrypted data to be verified according to the received security level of the terminal equipment, and providing network access service for the terminal equipment according to a verification result.
As a further alternative of the network access method, the determining, by the data to be encrypted, according to the security level of the terminal device and the security level of the first access point specifically includes:
the data to be encrypted is determined according to the difference value between the security level of the terminal equipment and the security level of the first access point;
if the difference value is greater than or equal to zero, positively calling data corresponding to the absolute value of the difference value from a data table to be encrypted as data to be encrypted;
and if the difference value is smaller than zero, reversely calling the data corresponding to the absolute value of the difference value from the data table to be encrypted as the data to be encrypted.
As a further alternative of the network access method, the method for determining the first access point as the target first access point includes:
acquiring a first random number and a second random number;
determining an encryption key corresponding to the first random number from a preset data table to be encrypted;
encrypting the second random number by using the encryption key to obtain an encrypted random number;
determining a plurality of encryption keys to be verified corresponding to the first random number from a preset trusted data table to be encrypted, wherein the trusted data table to be encrypted is used for storing the mapping relation between the security level of a trusted associated access point and the encryption keys;
encrypting the encrypted random number by using the encryption key to be verified to obtain the random number to be verified;
and when the random number to be verified is consistent with the second random number, determining that the first access point is a target first access point, and the security level corresponding to the random number to be verified is the security level of the target first access point.
As a further alternative of the network access method, the verifying the encrypted data to be verified according to the received security level of the terminal device specifically includes:
and verifying the encrypted data to be verified according to the received security level of the terminal equipment, the known security level of the first access point and the known encryption key of the first access point.
As a further alternative of the network access method, the verifying the encrypted data to be verified according to the received security level of the terminal device, the known security level of the first access point and the known encryption key of the first access point specifically includes:
determining data to be verified according to the received security level of the terminal equipment and the known security level of the first access point;
and encrypting the data to be verified by using the known security key of the first access point to obtain encrypted verification data.
As a further alternative of the network access method, the providing, according to the verification result, a network access service for the terminal device specifically includes:
and when the encrypted verification data is consistent with the encrypted data to be verified, the verification is passed, and network access service is provided for the terminal equipment.
A network access system, comprising:
the terminal equipment is used for sending a network access request to the first access point, wherein the network access request comprises data to be encrypted, the security level of the terminal equipment and the identifier of a second access point corresponding to the terminal equipment, and the data to be encrypted is determined according to the security level of the terminal equipment and the security level of the first access point;
the first access point is used for sending a device authentication request to the second access point according to the identifier of the second access point when the first access point is a target first access point, wherein the device authentication request comprises to-be-verified encrypted data and the security level of the terminal device, the to-be-verified encrypted data is obtained by encrypting the to-be-encrypted data by an encryption key, and the encryption key is determined according to a first random number and a second random number provided by the second access point;
and the second access point is used for verifying the encrypted data to be verified according to the received security level of the terminal equipment and providing network access service for the terminal equipment according to a verification result.
A network access device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of any one of the network access methods described above when the computer program is executed.
A readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of any of the above network access methods.
A communication method employing the steps of any one of the above network access methods.
The beneficial effects of the invention are as follows: the network access request is sent to the first access point, the network access request comprises data to be encrypted, the security level of the terminal equipment and the identifier of the second access point corresponding to the terminal equipment, the data to be encrypted is determined according to the security level of the terminal equipment and the security level of the first access point, the suspicious terminal can be prevented from accessing the first access point, further the suspicious terminal is prevented from attacking other terminals, and network security is improved; meanwhile, when the first access point is the target first access point, a device authentication request is sent to the second access point according to the identifier of the second access point, the device authentication request comprises encrypted data to be verified and the security level of the terminal device, the encrypted data to be verified is obtained by encrypting the encrypted data by an encryption key, the encryption key is determined according to a first random number and a second random number provided by the second access point, the encrypted data to be verified is verified according to the received security level of the terminal device, network access service is provided for the terminal device according to the verification result, the first access point can directly provide network access service for the terminal device after passing verification, all information does not need to pass through other access points, communication efficiency is high, and user experience is good.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a network access method according to an embodiment of the present invention;
fig. 2 is a sub-flowchart of a network access method according to an embodiment of the present invention;
fig. 3 is another sub-flowchart of a network access method according to an embodiment of the present invention;
fig. 4 is another sub-flowchart of a network access method according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a network access system according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a network access device according to an embodiment of the present invention.
Detailed Description
The following description of the technical solutions in the embodiments of the present invention will be clear and complete, and it is obvious that the described embodiments are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In some related technologies, a visitor mode is set in an access point device to provide network access service for a terminal without an access code corresponding to the access point, and the terminal can access the access code of the access point only through identity verification to obtain the network access service provided by the access point.
However, with the development of the darkness guest technology, a hacker can steal the privacy of a terminal user by monitoring the data communication performed by the terminal of an access point such as an access router, a switch and the like; even the user can be hijacked to access the fishing hot spot, and the traffic hijacking, the tampering and the like are realized.
A vulnerability named as "KRACK (Key ReiNstallatioN Attack )" is based on WPA2 security protocol, and an attacker uses a one-time key provided by an access point to a terminal to crack information exchanged between the access point and the terminal to obtain important information such as credit card, chat information, payment password, etc. of a terminal user.
In particular, the access point is an access point releasing Wi-Fi signals for public places, and the access password is known to all public, so that a hacker can crack information exchanged between the access point and the terminal more easily.
In other related technologies, when the terminal moves to an area where the Wi-Fi signal released by the home Wi-Fi cannot cover, the terminal sends information to be sent to the home Wi-F i to the access point corresponding to the other Wi-Fi signal, and the access point corresponding to the other Wi-F i signal sends the received information to the home Wi-F i.
That is, all information needs to be forwarded to the home Wi-F i through other access points, and although the home Wi-F i can provide network access service for the terminal, the communication efficiency is low and the user experience is poor due to the fact that the forwarding of other access points is needed.
Example 1:
referring to fig. 1, the present embodiment provides a method for providing a network access service.
The network may be a wide area internet or a local area network (such as a campus network), and when the network is a local area network, there are at least two access points (such as a router, a switch, etc.) in the coverage area of the network, where the terminal can access the local area network.
The access point of the network may be a router, a switch, etc. specifically, which releases the Wi-F i signal, and the terminal in the coverage area of the Wi-F i signal may access the network by connecting the Wi-F i signal.
A network may have multiple access points, such as for wide area internet, almost all routers are their access points.
The first access point specifically refers to an access point corresponding to a Wi-F i signal currently searched by a terminal needing to access the network, and the terminal does not have an access code (or Wi-F i code) corresponding to the access point, so that the terminal cannot access the network through the access point (or the access point cannot provide network access service for the access point). The second access point means that the terminal has access authority of the access point, and the authority includes but is not limited to a password and a ciphertext.
Specifically, when the access point corresponding to the access code owned by the terminal does not work or the terminal is just out of the coverage range of Wi-F i signals released by the access points, after the terminal searches for other Wi-F i signals, the terminal sends a network access request to the access point corresponding to the searched Wi-F i signals, where the network access request is used for releasing the access point (i.e., the first access point) of the Wi-Fi signals to provide network access service for the access point.
After searching for a plurality of Wi-Fi signals, the terminal may send application information to access points corresponding to the plurality of Wi-Fi signals, where the access points corresponding to the plurality of Wi-Fi signals are all first access points.
Based on the above, the network access method provided by the embodiment of the present invention includes:
step 1, sending a network access request to a first access point, wherein the network access request comprises data to be encrypted, the security level of terminal equipment and the identifier of a second access point corresponding to the terminal equipment, and the data to be encrypted is determined according to the security level of the terminal equipment and the security level of the first access point;
referring to fig. 2, in an embodiment of the present invention, a method for determining data to be encrypted according to a security level of the terminal device and a security level of the first access point includes: the data to be encrypted is determined according to the difference value between the security level of the terminal equipment and the security level of the first access point; if the difference value is greater than or equal to zero, positively calling data corresponding to the absolute value of the difference value from a data table to be encrypted as data to be encrypted; and if the difference value is smaller than zero, reversely calling the data corresponding to the absolute value of the difference value from the data table to be encrypted as the data to be encrypted.
The embodiment of the invention only needs to configure a group of data interfaces to be encrypted between the equipment terminal and the first access point, and the data interfaces are stored in the terminal equipment and the first access point in the form of a data table to be encrypted.
Step 2, when the first access point is a target first access point, sending a device authentication request to the second access point according to the identifier of the second access point, wherein the device authentication request comprises encrypted data to be verified and the security level of terminal equipment, the encrypted data to be verified is obtained by encrypting the data to be encrypted by an encryption key, and the encryption key is determined according to a first random number and a second random number provided by the second access point;
referring to fig. 3, in an embodiment of the present invention, a method for determining that a first access point is a target first access point includes: acquiring a first random number and a second random number; determining an encryption key corresponding to the first random number from a data table to be encrypted; encrypting the second random number by using the encryption key to obtain an encrypted random number; determining a plurality of encryption keys to be verified corresponding to the first random number from a trusted data table to be encrypted, wherein the trusted data table to be encrypted is used for storing the mapping relation between the security level of a trusted associated access point and the encryption keys; encrypting the encrypted random number by using the encryption key to be verified to obtain the random number to be verified; and when the random number to be verified is consistent with the second random number, determining that the first access point is a target first access point, and the security level corresponding to the random number to be verified is the security level of the target first access point.
According to the embodiment of the invention, a plurality of sets of data to be encrypted are configured between the first access node and the second access node, and the target data can be determined according to actual conditions, so that the verification of the first access node is more flexible and reliable.
And step 3, verifying the encrypted data to be verified according to the received security level of the terminal equipment, and providing network access service for the terminal equipment according to a verification result.
Referring to fig. 4, in an embodiment of the present invention, a method for verifying the encrypted data to be verified according to the received security level of the terminal device includes: and verifying the encrypted data to be verified according to the received security level of the terminal equipment, the known security level of the first access point and the known encryption key of the first access point.
In the embodiment of the present invention, the method for verifying the encrypted data to be verified according to the received security level of the terminal device, the known security level of the first access point and the known encryption key of the first access point includes: determining data to be verified according to the received security level of the terminal equipment and the known security level of the first access point; encrypting the data to be verified by using a known security key of the first access point to obtain encrypted verification data; and when the encrypted verification data is consistent with the encrypted data to be verified, the verification is passed, and network access service is provided for the terminal equipment.
The embodiment of the invention can improve the security of network access service by the method for verifying the encrypted data to be verified according to the security level of the terminal equipment. By determining the data to be verified and encrypting the data using the known security key of the first access point, the integrity and security of the data can be ensured. When the encrypted verification data is consistent with the encrypted data to be verified, the verification can be passed and network access service can be provided for the terminal equipment. Thus, unauthorized equipment can be effectively prevented from accessing the network, and the network security is protected.
In summary, an embodiment of the present invention provides a network access method, capable of sending a network access request to a first access point, where the network access request includes data to be encrypted, a security level of a terminal device, and an identifier of a second access point corresponding to the terminal device, where the data to be encrypted is determined according to the security level of the terminal device and the security level of the first access point; when the first access point is a target first access point, sending a device authentication request to the second access point according to the identifier of the second access point, wherein the device authentication request comprises encryption data to be verified and the security level of terminal equipment, the encryption data to be verified is obtained by encrypting the encryption data to be encrypted by an encryption key, and the encryption key is determined according to a first random number and a second random number provided by the second access point; and verifying the encrypted data to be verified according to the received security level of the terminal equipment, and providing network access service for the terminal equipment according to a verification result. By the method for providing the network access service, on one hand, the suspicious first access point can be accessed to the second access point, the suspicious terminal is prevented from accessing the first access point, further, the suspicious terminal is prevented from attacking other terminals, and the network security is improved; on the other hand, after passing the verification, the first access point directly provides network access service for the terminal, all information does not need to pass through other access points, the communication efficiency is high, and the user experience is good.
Example 2:
referring to fig. 5, based on the foregoing embodiment, an embodiment of the present invention further provides a network access system, including:
the terminal equipment is used for sending a network access request to the first access point, wherein the network access request comprises data to be encrypted, the security level of the terminal equipment and the identifier of a second access point corresponding to the terminal equipment, and the data to be encrypted is determined according to the security level of the terminal equipment and the security level of the first access point;
the first access point is used for sending a device authentication request to the second access point according to the identifier of the second access point when the first access point is a target first access point, wherein the device authentication request comprises to-be-verified encrypted data and the security level of the terminal device, the to-be-verified encrypted data is obtained by encrypting the to-be-encrypted data by an encryption key, and the encryption key is determined according to a first random number and a second random number provided by the second access point;
and the second access point is used for verifying the encrypted data to be verified according to the received security level of the terminal equipment and providing network access service for the terminal equipment according to a verification result.
It should be understood that, for the same inventive concept, the network system provided in the embodiment of the present invention and the network device access method provided in the foregoing embodiment, and for the detailed process of each step in the embodiment of the present invention, reference may be made to the foregoing embodiment, and details are not repeated in the embodiment of the present invention.
Example 3:
referring to fig. 6, based on the foregoing inventive concept, an embodiment of the present invention further provides a network access device and a readable storage medium, where the network access device includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor implements the steps of any one of the network access methods described above when executing the computer program, and the readable storage medium stores the computer program thereon, where the computer program implements the steps of any one of the network access methods described above when executed by the processor.
In practical applications, the network access device may be a router, a gateway, or the like, and the specific device is not limited in this embodiment.
Example 4:
based on the above embodiment, the embodiment of the present invention further provides a communication method, where the method applies the steps of any one of the network access methods, including:
sending a network access request to a first access point, wherein the network access request comprises data to be encrypted, the security level of terminal equipment and the identifier of a second access point corresponding to the terminal equipment, and the data to be encrypted is determined according to the security level of the terminal equipment and the security level of the first access point;
when the first access point is a target first access point, sending a device authentication request to the second access point according to the identifier of the second access point, wherein the device authentication request comprises encryption data to be verified and the security level of terminal equipment, the encryption data to be verified is obtained by encrypting the encryption data to be encrypted by an encryption key, and the encryption key is determined according to a first random number and a second random number provided by the second access point;
and verifying the encrypted data to be verified according to the received security level of the terminal equipment, and providing network access service for the terminal equipment according to a verification result so as to realize wireless communication of the terminal equipment.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.

Claims (10)

1. The network access method is characterized by comprising the following steps:
sending a network access request to a first access point, wherein the network access request comprises data to be encrypted, the security level of terminal equipment and the identifier of a second access point corresponding to the terminal equipment, and the data to be encrypted is determined according to the security level of the terminal equipment and the security level of the first access point;
when the first access point is a target first access point, sending a device authentication request to the second access point according to the identifier of the second access point, wherein the device authentication request comprises encryption data to be verified and the security level of terminal equipment, the encryption data to be verified is obtained by encrypting the encryption data to be encrypted according to an encryption key, and the encryption key is determined according to a first random number and a second random number provided by the second access point;
and verifying the encrypted data to be verified according to the received security level of the terminal equipment, and providing network access service for the terminal equipment according to a verification result.
2. The network access method according to claim 1, wherein the data to be encrypted is determined according to the security level of the terminal device and the security level of the first access point, and specifically comprises:
the data to be encrypted is determined according to the difference value between the security level of the terminal equipment and the security level of the first access point;
if the difference value is greater than or equal to zero, positively calling data corresponding to the absolute value of the difference value from a data table to be encrypted as data to be encrypted;
and if the difference value is smaller than zero, reversely calling the data corresponding to the absolute value of the difference value from the data table to be encrypted as the data to be encrypted.
3. The network access method of claim 2, wherein the method of determining the first access point as the target first access point comprises:
acquiring a first random number and a second random number;
determining an encryption key corresponding to the first random number from a preset data table to be encrypted;
encrypting the second random number by using the encryption key to obtain an encrypted random number;
determining a plurality of encryption keys to be verified corresponding to the first random number from a preset trusted data table to be encrypted, wherein the trusted data table to be encrypted is used for storing the mapping relation between the security level of a trusted associated access point and the encryption keys;
encrypting the encrypted random number by using the encryption key to be verified to obtain the random number to be verified;
and when the random number to be verified is consistent with the second random number, determining that the first access point is a target first access point, and the security level corresponding to the random number to be verified is the security level of the target first access point.
4. A network access method according to claim 3, wherein the verifying the encrypted data to be verified according to the received security level of the terminal device specifically comprises:
and verifying the encrypted data to be verified according to the received security level of the terminal equipment, the known security level of the first access point and the known encryption key of the first access point.
5. The network access method according to claim 4, wherein the verifying the encrypted data to be verified according to the received security level of the terminal device, the known security level of the first access point and the known encryption key of the first access point specifically comprises:
determining data to be verified according to the received security level of the terminal equipment and the known security level of the first access point;
and encrypting the data to be verified by using the known security key of the first access point to obtain encrypted verification data.
6. The network access method according to claim 5, wherein the providing the network access service for the terminal device according to the verification result specifically includes:
and when the encrypted verification data is consistent with the encrypted data to be verified, the verification is passed, and network access service is provided for the terminal equipment.
7. A network access system, comprising:
the terminal equipment is used for sending a network access request to the first access point, wherein the network access request comprises data to be encrypted, the security level of the terminal equipment and the identifier of a second access point corresponding to the terminal equipment, and the data to be encrypted is determined according to the security level of the terminal equipment and the security level of the first access point;
the first access point is used for sending a device authentication request to the second access point according to the identifier of the second access point when the first access point is a target first access point, wherein the device authentication request comprises to-be-verified encrypted data and the security level of the terminal device, the to-be-verified encrypted data is obtained by encrypting the to-be-encrypted data by an encryption key, and the encryption key is determined according to a first random number and a second random number provided by the second access point;
and the second access point is used for verifying the encrypted data to be verified according to the received security level of the terminal equipment and providing network access service for the terminal equipment according to a verification result.
8. A network access device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the network access method of any of claims 1-6 when the computer program is executed.
9. A readable storage medium, characterized in that the storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of the network access method of any of claims 1-6.
10. A communication method, characterized in that the method uses the steps of the network access method according to any one of claims 1-6.
CN202311593836.2A 2023-11-27 2023-11-27 Network access method, system, equipment, storable medium and communication method Pending CN117641355A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311593836.2A CN117641355A (en) 2023-11-27 2023-11-27 Network access method, system, equipment, storable medium and communication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311593836.2A CN117641355A (en) 2023-11-27 2023-11-27 Network access method, system, equipment, storable medium and communication method

Publications (1)

Publication Number Publication Date
CN117641355A true CN117641355A (en) 2024-03-01

Family

ID=90019343

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311593836.2A Pending CN117641355A (en) 2023-11-27 2023-11-27 Network access method, system, equipment, storable medium and communication method

Country Status (1)

Country Link
CN (1) CN117641355A (en)

Similar Documents

Publication Publication Date Title
RU2546610C1 (en) Method of determining unsafe wireless access point
US8320883B2 (en) Method to dynamically authenticate and control mobile devices
US7913080B2 (en) Setting information distribution apparatus, method, program, and medium, authentication setting transfer apparatus, method, program, and medium, and setting information reception program
US7783756B2 (en) Protection for wireless devices against false access-point attacks
CN110324287A (en) Access authentication method, device and server
EP1873998B1 (en) Identifiers in a communication system
US20060114863A1 (en) Method to secure 802.11 traffic against MAC address spoofing
US20040090930A1 (en) Authentication method and system for public wireless local area network system
US20100106966A1 (en) Method and System for Registering and Verifying the Identity of Wireless Networks and Devices
US20090029677A1 (en) Mobile authentication through strengthened mutual authentication and handover security
CN111885604B (en) Authentication method, device and system based on heaven and earth integrated network
KR20150053912A (en) Method and devices for registering a client to a server
CN105657702A (en) Authentication method, authentication system, authentication method of mobile terminal and mobile terminal
CN105763517A (en) Router security access and control method and system
US11202192B2 (en) Registering user equipment with a visited public land mobile network
Gui et al. A new authentication rfid protocol with ownership transfer
CN101610509B (en) Method, device and system for protecting communication security
CN117641355A (en) Network access method, system, equipment, storable medium and communication method
Bocan et al. Threats and Countermeasures in GSM Networks.
CN112399416B (en) Access method and device
WO2022067627A1 (en) A method for preventing leakage of authentication sequence number of a mobile terminal
Lee et al. Man-in-the-middle Attacks Detection Scheme on Smartphone using 3G network
KR100968522B1 (en) Mobile Authentication Method for Strengthening the Mutual Authentication and Handover Security
CN113316141B (en) Wireless network access method, sharing server and wireless access point
CN113316139B (en) Wireless network access method and wireless access point

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination