CN1812418A - Method and system for testing safety switch-in protocol conformity of network terminal - Google Patents

Method and system for testing safety switch-in protocol conformity of network terminal Download PDF

Info

Publication number
CN1812418A
CN1812418A CNA2006100418484A CN200610041848A CN1812418A CN 1812418 A CN1812418 A CN 1812418A CN A2006100418484 A CNA2006100418484 A CN A2006100418484A CN 200610041848 A CN200610041848 A CN 200610041848A CN 1812418 A CN1812418 A CN 1812418A
Authority
CN
China
Prior art keywords
field
access point
protocol
test
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2006100418484A
Other languages
Chinese (zh)
Other versions
CN100496052C (en
Inventor
张变玲
曹军
涂学峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Iwncomm Co Ltd
Original Assignee
China Iwncomm Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Iwncomm Co Ltd filed Critical China Iwncomm Co Ltd
Priority to CNB2006100418484A priority Critical patent/CN100496052C/en
Publication of CN1812418A publication Critical patent/CN1812418A/en
Priority to PCT/CN2007/000635 priority patent/WO2007098692A1/en
Application granted granted Critical
Publication of CN100496052C publication Critical patent/CN100496052C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/03Protocol definition or specification 

Abstract

A method for testing safety switching in protocol conformity of network terminal includes activating safety switching in certification procedure, seizing safety switching in protocol data packet generated in certification procedure, detecting and analyzing package format and protocol flow process of safety switching in protocol data packet.

Description

The method and system of the safety switch-in protocol conformity of turn-on test of the network terminal
One, technical field
The present invention relates to network security access protocol field tests, especially a kind of method and system thereof of safety switch-in protocol conformity of turn-on test of the network terminal.
Two, background technology
IP network loaded service kind is various day by day, got involved in national economy and each aspect of society, Wireless IP network more makes the opening of network physical reach the new stage by the radio wave transmissions data, thus, safety inserts becomes key issue wired and the wireless network secure operation.
The safety access system of IP network is mainly concerned with three network entities: the network terminal, access point (claiming the base station again) and authentication server.The various resources that network terminal request access network, enjoy network provide; Access point is the edge device of IP internet, is the entity that access service is provided for the network user; Authentication server provides the entity that user identity is differentiated service.
Mainly contain the auxiliary management test macro that WI-FI alliance uses at interoperability test macro and some WLAN (wireless local area network) of IEEE802.11 standard about network terminal product safety access protocol test macro at present.Wherein auxiliary management test macro mainly provides network system installation and the relevant information of using by the state of monitoring physical channel and network.The interoperability test macro of WI-FI alliance is to verify the correctness that agreement realizes in the Devices to test by the test Devices to test with the interoperability of reference device and the performance of communicating by letter, and promptly the agreement accordance detects.This test macro has following shortcoming:
1, by the typical application environment, promptly the interoperability of upper-layer protocol comes testing equipment to have imperfection, and may there be deviation in test result.
2, the correctness degree of reference device realization will have a strong impact on precision of test result.
3, can not provide test not by the location of mistake information under the situation.
Three, summary of the invention
The present invention is for solving the above-mentioned technical problem that exists in the background technology, and provides that a kind of test result is accurate, test data is complete and can carry out the method and the system thereof of safety switch-in protocol conformity of turn-on test of the network terminal of location of mistake.
Technical solution of the present invention is: a kind of method of safety switch-in protocol conformity of turn-on test of the network terminal, and its special character is: this method may further comprise the steps:
1) activates safe access protocol verification process;
2) catch the safe access protocol packet that produces in this verification process;
3) analyzing and testing safety access protocol packet encapsulation form and agreement flow process.
Above-mentioned safe access protocol is WAPI agreement or IEEE802.11i agreement.
When the safety access protocol was the WAPI agreement, said method comprised that also step 4) disposes the combined situation that WAPI enables in terminal and access point respectively, analyzes the correctness that the access point access control function is realized.
Above-mentioned steps 4) combined situation that terminal in and access point configuration WAPI enable comprises:
1.1) terminal to be measured enables that the WAI wildcard is differentiated and the WAPI security mechanism of key management mode, the benchmark access point adopts the WAPI security mechanism of certificate discriminating and key management mode, and dut terminal can not be communicated by letter with the benchmark access point;
1.2) terminal to be measured enables that the WAI certificate is differentiated and the WAPI security mechanism of key management mode, the benchmark access point adopts the WAPI security mechanism of wildcard discriminating and key management mode, and terminal can not be communicated by letter with the benchmark access point.
Above-mentioned WAPI protocol data bag comprises: WAI: differentiate Active Frame, access discriminating request, request of certificate authentication, certificate discriminating response, insert and differentiate that response, unicast key agreement request, unicast key agreement response, unicast key agreement affirmation, multicast key notification, multicast key notification respond; WPI: unicast data frames.
Above-mentioned steps 2) incomplete if the WAPI protocol data is caught in, the network terminal then to be measured continues 3 to handle set by step catching data not by the WAPI test, and display result.
Above-mentioned access differentiates that the analyte detection process of request is as follows:
2.1) check the whether regulation in the conformance with standard of version number;
2.2) check whether the data length field value is consistent with the length of data field;
2.3) differentiate relatively whether the value of the discriminating identification field in the discriminating grouping that the value of identification field and access point send is identical;
2.4) whether comparison terminal certificate field content identical with local terminal certificate content of preserving;
2.5) check whether encapsulation format and the length of the signature field of ASUE inquiry, ASUE key data, terminal identity, ECDH parameter and ASUE conform to regulation in the standard.
The analyte detection process of above-mentioned unicast key agreement response is as follows:
3.1) check the whether regulation in the conformance with standard of version number;
3.2) check whether the data length field value is consistent with the length of data field;
3.3) length of checking BKID, USKID, ADDID, ASUE inquiry and WIE field whether with standard in stipulate consistent;
3.4) check whether the value of the AE inquiry field in the value of AE inquiry field and the unicast key agreement request that access point sends is identical;
3.5) check whether the length of Message Authentication Code field is consistent with regulation in the standard.
The analyte detection process of above-mentioned multicast key notification response is as follows:
4.1) check the whether regulation in the conformance with standard of version number;
4.2) check whether the data length field value is consistent with the length of data field;
4.3) relatively whether the MSKID field value identical with MSKID field value during the multicast key notification that access point sends is divided into groups;
4.4) relatively whether the USKID field value identical with USKID field value during the multicast key notification that access point sends is divided into groups;
4.5) relatively whether the key announce identification field values identical with key announce identification field values during the multicast key notification that access point sends is divided into groups;
4.6) check whether the length of Message Authentication Code field is consistent with regulation in the standard.
The analyte detection process of above-mentioned unicast data frames is as follows:
5.1) check that the value of session key index field is whether in the scope of standard code;
5.2) check that the value of packet sequence number field is whether in the scope of standard code;
5.3) whether the value of judgment data grouping serial number field be even number.
A kind of system of method of the safety switch-in protocol conformity of turn-on test that realizes the above-mentioned network terminal, its special character is: this system comprises Monitoring and Controlling platform, benchmark authentication server, benchmark access point, hub and the auxilliary terminal to be measured of surveying software is installed, described Monitoring and Controlling platform, benchmark authentication server and benchmark access point are connected on the hub, and described terminal to be measured is associated with in the benchmark access point by Radio Link.
The above-mentioned network terminal to be measured comprises notebook computer and network adapter.
The present invention is based on that the network terminal designs, and can be used for that the network terminal that equipment vendors produce is carried out correctness and consistency that safe access protocol realizes and tests.The present invention has not only adopted the Interoperability Testing of agreement, test the interoperability of the network terminal to be measured and benchmark access point and authentication server, catching, resolving and analyzing also by safe access protocol data completely, and the safe access protocol process analysis that realizes on this basis and the simulation test of abnormal conditions, ensured that the product by test meets the regulation and the interoperability of GB fully.Therefore the present invention has following advantage:
1, test result is more accurate.The present invention has introduced catching and complete analytical method of related protocol data, makes the result of test more accurate.
2, test data is complete.Because test process has comprised complete data capture analysis, can provide the details of protocol data in the Devices to test.
3, can carry out location of mistake.Because agreement implementation process has been carried out the detection of microcosmic, mistake that can accurate localization agreement realization aspect.
Four, description of drawings
Fig. 1 is the topological structure figure of system of the present invention.
Five, embodiment
The all applicable method of the present invention of WAPI agreement or IEEE802.11i agreement, its step is as follows:
1) activates safe access protocol verification process;
2) catch the safe access protocol packet that produces in this verification process;
3) analyzing and testing safety access protocol packet encapsulation form and agreement flow process.
Be specific embodiment when being the WAPI agreement with the safety access protocol below, the whole concrete testing process of its method is as follows:
1) activates the WAPI verification process;
2) catch the WAPI protocol data bag that produces in this verification process; If it is incomplete that the WAPI protocol data is caught, the network terminal then to be measured continues 3 to handle set by step catching data not by the WAPI test, and display result;
WAPI protocol data bag comprises: WAI: differentiate Active Frame, access discriminating request, request of certificate authentication, certificate discriminating response, insert and differentiate that response, unicast key agreement request, unicast key agreement response, unicast key agreement affirmation, multicast key notification, multicast key notification respond; WPI: unicast data frames.
3) analyzing and testing WAPI protocol data is sealed dress form and agreement flow process.Wherein only need to carry out analyzing and testing to inserting discriminating request, key negotiation response, multicast key notification response and unicast data frames.
The analyte detection process that inserts the request of discriminating is as follows:
1.1) check the whether regulation in the conformance with standard of version number;
1.2) check whether the data length field value is consistent with the length of data field;
1.3) differentiate relatively whether the value of the discriminating identification field in the discriminating grouping that the value of identification field and access point send is identical;
1.4) whether comparison terminal certificate field content identical with local terminal certificate content of preserving;
1.5) check whether encapsulation format and the length of the signature field of ASUE inquiry, ASUE key data, terminal identity, ECDH parameter and ASUE conform to regulation in the standard.
The analyte detection process of unicast key agreement response is as follows:
2.1) check the whether regulation in the conformance with standard of version number;
2.2) check whether the data length field value is consistent with the length of data field;
2.3) length of checking BKID, USKID, ADDID, ASUE inquiry and WIE field whether with standard in stipulate consistent;
2.4) check whether the value of the AE inquiry field in the value of AE inquiry field and the unicast key agreement request that access point sends is identical;
2.5) check whether the length of Message Authentication Code field is consistent with regulation in the standard.
The analyte detection process of multicast key notification response is as follows:
3.1) check the whether regulation in the conformance with standard of version number;
3.2) check whether the data length field value is consistent with the length of data field;
3.3) relatively whether the MSKID field value identical with MSKID field value during the multicast key notification that access point sends is divided into groups;
3.4) relatively whether the USKID field value identical with USKID field value during the multicast key notification that access point sends is divided into groups;
3.5) relatively whether the key announce identification field values identical with key announce identification field values during the multicast key notification that access point sends is divided into groups;
3.6) check whether the length of Message Authentication Code field is consistent with regulation in the standard.
The analyte detection process of unicast data frames is as follows:
4.1) check that the value of session key index field is whether in the scope of standard code;
4.2) check that the value of packet sequence number field is whether in the scope of standard code;
4.3) whether the value of judgment data grouping serial number field be even number.
In the above analyte detection process, if there is a detection not pass through, then the test result of this network terminal to be measured promptly must be passed through above-mentioned all test items for not passing through, and the network terminal to be measured could pass through the agreement accordance and detect.
The present invention comprises that also step 4) disposes the combined situation that WAPI enables in terminal and access point respectively, analyzes the correctness that the access point access control function is realized.Wherein terminal and the access point configuration WAPI combined situation of enabling comprises:
5.1) terminal to be measured enables that the WAI wildcard is differentiated and the WAPI security mechanism of key management mode, the benchmark access point adopts the WAPI security mechanism of certificate discriminating and key management mode, and dut terminal can not be communicated by letter with benchmark AP;
5.2) terminal to be measured enables that the WAI certificate is differentiated and the WAPI security mechanism of key management mode, the benchmark access point adopts the WAPI security mechanism of wildcard discriminating and key management mode, and terminal can not be communicated by letter with the benchmark access point.
Check that in these cases can terminal to be measured carry out correct access control function under the various configuring conditions of access point WAPI of terminal to be measured and benchmark.
Step 4) can be carried out before step 1), also can carry out after step 3), and the effect that it played is identical.
Referring to Fig. 1, system of the present invention comprises Monitoring and Controlling platform 1, benchmark authentication server 4, benchmark access point 3, hub 2 and the auxilliary terminal to be measured 5 of surveying software is installed, described Monitoring and Controlling platform 1, benchmark authentication server 4 and benchmark access point 3 are connected on the hub 2, described terminal to be measured 5 is associated with in the benchmark access point 3 by Radio Link, and terminal 5 to be measured comprises notebook computer and network adapter.
During system works, benchmark authentication server 4 issue access point and terminal certificate and be installed to terminal 5 to be measured and benchmark access point 3 and Monitoring and Controlling platform 1 in.After enabling the WAPI of benchmark access point 3 and terminal to be measured 5, terminal 5 to be measured is associated with benchmark access point 3; Monitoring and Controlling platform 1 is caught the WAPI protocol data bag in the WAPI authentication process, and provides analysis result.
Explanation of nouns:
1, ECDH: elliptic curve DH exchange, a kind of algorithm of finishing cipher key change.
2, ASUE: identification requester entity, the entity of operation is differentiated in request before access service.
3, BKID: base key sign, base key index value.
4, USKID: singlecast key sign, singlecast key index value.
5, AE: the discriminator entity, for identification requester supplies to differentiate the entity of operating in the access service prerequisite.
6, ADDID: allocation index, mac address information.
7, WIE:WAPI information element comprises the parameter information of WAPI.
8, MSKID: multicast key sign, multicast key index value.

Claims (12)

1, the method for a kind of safety switch-in protocol conformity of turn-on of network terminal test, it is characterized in that: this method may further comprise the steps:
1) activates safe access protocol verification process;
2) catch the safe access protocol packet that produces in this verification process;
3) analyzing and testing safety access protocol packet encapsulation form and agreement flow process.
2, the method for the safety switch-in protocol conformity of turn-on of the network terminal according to claim 1 test, it is characterized in that: described safe access protocol is WAPI agreement or IEEE802.11i agreement.
3, the method for the safety switch-in protocol conformity of turn-on of the network terminal according to claim 2 test, it is characterized in that: when the safety access protocol is the WAPI agreement, this method comprises that also step 4) disposes the combined situation that WAPI enables in terminal and access point respectively, analyzes the correctness that the access point access control function is realized.
4, the method for the safety switch-in protocol conformity of turn-on of the network terminal according to claim 3 test is characterized in that; The combined situation that terminal in the described step 4) and access point configuration WAPI enable comprises:
1.1) terminal to be measured enables that the WAI wildcard is differentiated and the WAPI security mechanism of key management mode, the benchmark access point adopts the WAPI security mechanism of certificate discriminating and key management mode, and dut terminal can not be communicated by letter with the benchmark access point;
1.2) terminal to be measured enables that the WAI certificate is differentiated and the WAPI security mechanism of key management mode, the benchmark access point adopts the WAPI security mechanism of wildcard discriminating and key management mode, and terminal can not be communicated by letter with the benchmark access point.
5, the method for the safety switch-in protocol conformity of turn-on of the network terminal according to claim 3 test, it is characterized in that: described WAPI protocol data bag comprises: WAI: differentiate Active Frame, access discriminating request, request of certificate authentication, certificate discriminating response, insert and differentiate that response, unicast key agreement request, unicast key agreement response, unicast key agreement affirmation, multicast key notification, multicast key notification respond; WPI: unicast data frames.
6, the method for the safety switch-in protocol conformity of turn-on of the network terminal according to claim 5 test, it is characterized in that: catch incomplete as if the WAPI protocol data described step 2), the network terminal then to be measured is not tested by WAPI, continuation 3 is handled set by step to catching data, and display result.
7, the method for the safety switch-in protocol conformity of turn-on of the network terminal according to claim 5 test is characterized in that: described access differentiates that the analyte detection process of request is as follows:
2.1) check the whether regulation in the conformance with standard of version number;
2.2) check whether the data length field value is consistent with the length of data field;
2.3) differentiate relatively whether the value of the discriminating identification field in the discriminating grouping that the value of identification field and access point send is identical;
2.4) whether comparison terminal certificate field content identical with local terminal certificate content of preserving;
2.5) check whether encapsulation format and the length of the signature field of ASUE inquiry, ASUE key data, terminal identity, ECDH parameter and ASUE conform to regulation in the standard.
8, the method for the safety switch-in protocol conformity of turn-on of the network terminal according to claim 5 test, it is characterized in that: the analyte detection process of described key negotiation response is as follows:
3.1) check the whether regulation in the conformance with standard of version number;
3.2) check whether the data length field value is consistent with the length of data field;
3.3) length of checking BKID, USKID, ADDID, ASUE inquiry and WIE field whether with standard in stipulate consistent;
3.4) check whether the value of the AE inquiry field in the value of AE inquiry field and the unicast key agreement request that access point sends is identical;
3.5) check whether the length of Message Authentication Code field is consistent with regulation in the standard.
9, the method for the safety switch-in protocol conformity of turn-on of the network terminal according to claim 5 test is characterized in that: the analyte detection process of described multicast key notification response is as follows:
4.1) check the whether regulation in the conformance with standard of version number;
4.2) check whether the data length field value is consistent with the length of data field;
4.3) relatively whether the MSKID field value identical with MSKID field value during the multicast key notification that access point sends is divided into groups;
4.4) relatively whether the USKID field value identical with USKID field value during the multicast key notification that access point sends is divided into groups;
4.5) relatively whether the key announce identification field values identical with key announce identification field values during the multicast key notification that access point sends is divided into groups;
4.6) check whether the length of Message Authentication Code field is consistent with regulation in the standard.
10, the method for the safety switch-in protocol conformity of turn-on of the network terminal according to claim 5 test, it is characterized in that: the analyte detection process of described unicast data frames is as follows:
5.1) check that the value of session key index field is whether in the scope of standard code;
5.2) check that the value of packet sequence number field is whether in the scope of standard code;
5.3) whether the value of judgment data grouping serial number field be even number.
11, a kind of system of method of the safety switch-in protocol conformity of turn-on test that realizes the described network terminal of claim 1, it is characterized in that: this system comprises Monitoring and Controlling platform, benchmark authentication server, benchmark access point, hub and the auxilliary terminal to be measured of surveying software is installed, described Monitoring and Controlling platform, benchmark authentication server and benchmark access point are connected on the hub, and described terminal to be measured is associated with in the benchmark access point by Radio Link.
12, the system of the safety switch-in protocol conformity of turn-on of the network terminal according to claim 11 test, it is characterized in that: described terminal to be measured comprises notebook computer and network adapter.
CNB2006100418484A 2006-02-28 2006-02-28 Method and system for testing safety access protocol conformity of network terminal Active CN100496052C (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CNB2006100418484A CN100496052C (en) 2006-02-28 2006-02-28 Method and system for testing safety access protocol conformity of network terminal
PCT/CN2007/000635 WO2007098692A1 (en) 2006-02-28 2007-02-28 An apparatus for testing the protocol conformance of the security accessing of network terminal and the method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2006100418484A CN100496052C (en) 2006-02-28 2006-02-28 Method and system for testing safety access protocol conformity of network terminal

Publications (2)

Publication Number Publication Date
CN1812418A true CN1812418A (en) 2006-08-02
CN100496052C CN100496052C (en) 2009-06-03

Family

ID=36845097

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006100418484A Active CN100496052C (en) 2006-02-28 2006-02-28 Method and system for testing safety access protocol conformity of network terminal

Country Status (2)

Country Link
CN (1) CN100496052C (en)
WO (1) WO2007098692A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102098668A (en) * 2010-12-20 2011-06-15 西安西电捷通无线网络通信股份有限公司 Detecting system and method for realizing negative test on robustness in WAPI (Wireless LAN Authentication and Privacy Infrastructure) equipment protocol
CN103442383A (en) * 2013-09-17 2013-12-11 西安西电捷通无线网络通信股份有限公司 Test method and system for authenticating server
CN104009889A (en) * 2014-06-10 2014-08-27 西安西电捷通无线网络通信股份有限公司 Communication protocol testing method and tested equipment and testing platform of communication protocol testing method
CN114205261A (en) * 2020-08-27 2022-03-18 中车株洲电力机车研究所有限公司 Automatic testing method for correctness of network communication data and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100527668C (en) * 2004-04-24 2009-08-12 华为技术有限公司 Method for implementing compatibility between WAPI protocol and 802.1X protocol

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102098668A (en) * 2010-12-20 2011-06-15 西安西电捷通无线网络通信股份有限公司 Detecting system and method for realizing negative test on robustness in WAPI (Wireless LAN Authentication and Privacy Infrastructure) equipment protocol
CN102098668B (en) * 2010-12-20 2012-11-07 西安西电捷通无线网络通信股份有限公司 Detecting system and method for realizing negative test on robustness in WAPI (Wireless LAN Authentication and Privacy Infrastructure) equipment protocol
CN103442383A (en) * 2013-09-17 2013-12-11 西安西电捷通无线网络通信股份有限公司 Test method and system for authenticating server
WO2015039498A1 (en) * 2013-09-17 2015-03-26 西安西电捷通无线网络通信股份有限公司 Authentication server testing method and system
CN103442383B (en) * 2013-09-17 2016-05-25 西安西电捷通无线网络通信股份有限公司 A kind of method of testing of authentication server and system
US10069816B2 (en) 2013-09-17 2018-09-04 China Iwncomm Co., Ltd. Authentication server testing method and system
CN104009889A (en) * 2014-06-10 2014-08-27 西安西电捷通无线网络通信股份有限公司 Communication protocol testing method and tested equipment and testing platform of communication protocol testing method
CN104009889B (en) * 2014-06-10 2017-04-26 西安西电捷通无线网络通信股份有限公司 Communication protocol testing method and tested equipment and testing platform of communication protocol testing method
US10243829B2 (en) 2014-06-10 2019-03-26 China Iwncomm Co., Ltd. Communication protocol testing method, and tested device and testing platform thereof
CN114205261A (en) * 2020-08-27 2022-03-18 中车株洲电力机车研究所有限公司 Automatic testing method for correctness of network communication data and storage medium
CN114205261B (en) * 2020-08-27 2024-02-20 中车株洲电力机车研究所有限公司 Automatic test method for correctness of network communication data and storage medium

Also Published As

Publication number Publication date
CN100496052C (en) 2009-06-03
WO2007098692A1 (en) 2007-09-07

Similar Documents

Publication Publication Date Title
CN1812417A (en) Method for testing safety switch-in protocol conformity of turn-on point and system thereof
CN1812419A (en) Method for testing safety switch-in protocol conformity to identify service entity and system thereof
CN1625132A (en) Automatic detection of wireless network type
CN1265607C (en) Method for building up service tunnel in wireless local area network
CN101079741A (en) Access point, access controller and method for monitoring illegal access
CN1842000A (en) Method for realizing access authentication of WLAN
US8601103B2 (en) Method, apparatus and system for distributing and enforcing authenticated network connection policy
CN1801709A (en) Access method for realizing WLAN multi mode safety identification
CN1656703A (en) System and method for managing wireless devices in an enterprise
CN1656718A (en) Monitoring a local area network
CN1812418A (en) Method and system for testing safety switch-in protocol conformity of network terminal
CN1659898A (en) Determining the state of a station in a local area
US9749200B2 (en) Method and apparatus for detecting application
Choi et al. Dissecting customized protocols: automatic analysis for customized protocols based on IEEE 802.15. 4
CN116938507A (en) Electric power internet of things security defense terminal and control system thereof
CN1695132A (en) Terminal authentication system, terminal authentication method, and terminal authentication server
CN1925402A (en) iSCSI identifying method, its initiating equipment and target equipment and identifying method
CN106454903A (en) Method and device for accessing smart terminal equipment into Internet
CN1874598A (en) Device, system and method of authenticating when terminal to access second system network
CN1849003A (en) Method for right discrimination to user
CN1787434A (en) System and method for safety identification to network customer terminal
Bitsikas et al. UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework
CN102843690A (en) Wireless access point-based penetration test system and test method thereof
CN201491275U (en) Wireless network testing and evidence-collecting system
CN1292564C (en) Method for detecting and processing forgery network service

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: XI AN IWNCOMM CO., LTD.

Free format text: FORMER NAME: XIDIAN JIETONG WIRELESS NETWORK COMMUNICATION CO LTD, XI AN

CP01 Change in the name or title of a patent holder

Address after: 710075 4F.C building, No. 12, No. two, hi tech Road, Shaanxi, Xi'an

Patentee after: Anxi Dianjietong Wireless Network Communications Co.,Ltd.

Address before: 710075 4F.C building, No. 12, No. two, hi tech Road, Shaanxi, Xi'an

Patentee before: Xi'an Xidian Jietong Wireless Network Communication Co., Ltd.