TW574655B - A WLAN network security control and intrusion detection method - Google Patents

A WLAN network security control and intrusion detection method Download PDF

Info

Publication number
TW574655B
TW574655B TW91108420A TW91108420A TW574655B TW 574655 B TW574655 B TW 574655B TW 91108420 A TW91108420 A TW 91108420A TW 91108420 A TW91108420 A TW 91108420A TW 574655 B TW574655 B TW 574655B
Authority
TW
Taiwan
Prior art keywords
wireless
network
station
wireless station
network management
Prior art date
Application number
TW91108420A
Other languages
Chinese (zh)
Inventor
Ji-Kai Wu
Original Assignee
Nat Datacomm Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nat Datacomm Corp filed Critical Nat Datacomm Corp
Priority to TW91108420A priority Critical patent/TW574655B/en
Application granted granted Critical
Publication of TW574655B publication Critical patent/TW574655B/en

Links

Description

574655 五、發明說明α) 【發明領域】 本發明係關於網路安全控制的機制與入侵偵測的方法 ,其所適用於無線區域通信,只靠一動態主機設定通訊協 定伺服器,一電子郵件伺服器,與一網路管理控制台即可 ,其特徵在於該網路管理控制台有内建一合法使用者的無 線站臺電腦名稱表。 【發明背景】 以往企業主花了大筆金錢架設企業内部網路後,常常 感覺該網路毫無用武之處!因為所有的員工,都只能在他 們自己的電腦,存取共享檔案或是收發電子郵件。同時, 每當工作同仁在開會或者離開工作崗位時,等待中的業務 人員和緊急的電子郵件就常常無法得到即時的回覆。這對 企業主而言,實在是不能再忍受下去了!架設一個無線的 辦公室網路環境,可減少辦公室中錯綜複雜的網路線,讓 工作同仁可以在辦公室任一角落中收發電子郵件或是存取 共享檔案,因此,無線網路暢通辦公室的網路環境,達成 行動辦公室的目標。 醫院安裝了無線區域網路以後,醫院内部的溝通有了 長足的改善:護士們只要透過行動手持式設備便可以進行 語音和資料的快速傳輸,醫師也可進行遠距醫療服務。以 往,醫院裡的護士必須經常的往返於病房之間以便接聽固 定式的專線電話。一位醫院的消息人士表示:「這不但表 示著護士們必須暫時將手中的病人,交給鄰近的護士來看574655 V. Description of the invention α) [Field of the invention] The present invention relates to a network security control mechanism and an intrusion detection method. The invention is applicable to wireless area communication, and only requires a dynamic host to set a protocol server and an email. The server and a network management console can be used, which is characterized in that the network management console has a built-in wireless station computer name table of a legitimate user. [Background of the Invention] In the past, after business owners spent large sums of money to set up an enterprise intranet, they often felt that the network was useless! Because all employees can only access shared files or send and receive email on their own computers. At the same time, whenever a colleague is in a meeting or leaves work, waiting business people and urgent e-mails often cannot get an immediate response. For business owners, this is really unbearable! Setting up a wireless office network environment can reduce the intricate network routes in the office, so that colleagues at work can send and receive emails or access shared files in any corner of the office. Therefore, the wireless network is free from the office network environment. Reach the goals of the Office of Operations. After the hospital installed a wireless LAN, communication within the hospital has been greatly improved: nurses can quickly transfer voice and data through mobile handheld devices, and doctors can perform telemedicine services. In the past, nurses in hospitals must frequently travel between wards in order to answer fixed-line calls. A hospital source said: "This not only means that nurses must temporarily hand over the patients in their hands to nearby nurses.

第4頁 574655 —— _ 五、發明說明(2) 顧:而且在他們接聽電話的時候會造成佔 電話無法接通到病房内。這麼一纟,在發生螫$得外部的 院方的緊急醫療處理小組,就很難有效㈣^、狀況時, 像疋醫院使用無線網路系統,醫生隨身攜P :上蠖士。」 (PDA )巡視病房,就能上網進入病歷資料庫 人#數位助理 ,無線區域網路IEEE 8〇〇2. Ub的電 :询掌握病情 響。, 《野西療器材並無影 學校架設校園無線網路,是正式進入 程碑,在校園無線區域網路架構中,口 e化校園的新里 置了至數台的無線橋接器(ACcess pQi f建置區域内放 在筆圮型電腦、個人數位助理、册 ,使用者只要 設備插上一片無線網卡,不必接^=合腦、或其他連網 限制,在校園内都可以無線飆網、、:暢:受建築物藩籬所 複數個無線橋接器,使校園無線區域網二學ί可建置 公共場所無線上網服務 機場,提供業務員或SOHO族 網地點,又不用遷就電話線 運中心。 下次看到警察在路邊用個人聋 牌資料、開罰單時,可別驚— 助理,連線上網查車 普及之賜,除了現有的咖啡磨外7共場所無線上網曰漸 便利商店、證券行等,#將;二:店、機場,加油站、 網,只要筆記型電腦或個人數助王上網订列,出外要上 数位助理(PDA)搭配無線網 九成以上,戶外涵蓋率越高田 外涵盍範圍達 η 對使用者越方便 2要集中在咖啡廳、飯店和 外找到談生意或工作的上 此外’機場更是商務人士轉Page 4 574655 —— _ V. Description of the invention (2) Gu: And when they answer the phone, they will not be able to connect to the ward. In this way, when the emergency medical treatment team of the external hospital is difficult, it is very difficult to effectively handle the situation. For example, the hospital uses a wireless network system, and the doctor carries the P: sister. (PDA) You can visit the ward to access the medical records database. Person #Digital Assistant, Wireless Local Area Network IEEE 8002. "The Wild West Therapy Equipment does not have a campus wireless network set up by the school. It is a formal entry into Chengbei. In the campus wireless local area network architecture, several wireless bridges (ACcess pQi f. Pen-type computers, personal digital assistants, and books are placed in the construction area. As long as the device is plugged in with a wireless network card, the user does not need to connect to the brain, or other network restrictions. :: Chang: By the wireless barriers of the building, the campus wireless area network can be used to build a public place wireless Internet service airport, providing a salesman or SOHO network location, without having to relocate to the telephone line transportation center. Next time you see the police using personal deaf card information and issuing tickets on the side of the road, do n’t be surprised — assistant, connect to the Internet to check the popularity of cars, except for the existing coffee mill.行 等 , # 将; 2: Stores, airports, gas stations, and nets, as long as laptops or personal data help the Internet to book online, go out and use a digital assistant (PDA) with more than 90% of wireless networks, outdoor The higher the coverage rate, the wider the field will be. Η The more convenient it is for users. 2 Focus on coffee shops, restaurants, and other places to talk about business or work. In addition, the airport is more for business people.

nai 第5頁 574655 五、發明說明(3) 路卡就行。 隨著科技發展與上網的普及,在家庭中,無線網路時 代正式宣告來臨,在客廳邊看連續劇邊上網討論劇情、在 廚房邊煮飯邊看股票報價、躺在床上打線上遊戲、甚至坐 在馬桶上看網路小說,這些情節都不是未來式,而是現在 進行式。 無線網路的應用當然不只這些,無線讓上網不再受限 於實體線路配置,上網也能兼顧移動需求。無線網路最大 的缺點就是覆蓋率將受無線基地台限制,屬定點服務,時 速2 0公里以上也無法收到訊號。 8 0 2 . 1 1 b無線網路相關配備跌價快,加上筆記型電腦 、PDA、甚至投影機都内建無線上網功能,有助無線上網 發展。目前無線橋接器(Access Point)的市價約六、七千 元,甚至更低,無線網路卡一張甚至只比一般網路卡貴一 、二成。 簡單來說,無線區域網路可以將原本一條網路線,透 過無線傳輸的方式,與多台電腦共享。 在高度行動化的使用者看來,維持語音和資料的暢通 聯繫一向是個問題。無線區域網路的技術成為解決上述問 題的最好方案。無線網路技術的風行,與電信業者為免去 室内線路佈建施工的困擾有很大的關係,才會透過無線網 路技術做為中繼電路。 如今,IEEE80 2. 1 lb等多種無線網路產品可為使用者 解決這個困擾,用戶除可免除實體線路安裝設定的困擾外nai Page 5 574655 V. Description of Invention (3) Luca is enough. With the development of technology and the popularization of the Internet, in the family, the wireless Internet era is officially announced, watching serials in the living room, discussing the plot online, watching stock quotes while cooking in the kitchen, playing online games in bed, and even sitting Looking at online novels on the toilet, these plots are not futuristic, but present. Of course, the application of wireless network is more than that. Wireless makes Internet access no longer limited to physical line configuration, and Internet access can also take into account mobile needs. The biggest disadvantage of the wireless network is that the coverage rate will be limited by the wireless base station, which is a fixed-point service, and cannot receive signals at speeds of more than 20 kilometers per hour. 8 0 2. 1 1 b The price of wireless-related equipment has fallen rapidly. In addition, notebook computers, PDAs, and even projectors have built-in wireless Internet access functions, which helps the development of wireless Internet access. At present, the market price of a wireless bridge (Access Point) is about six or seven thousand yuan, or even lower. A wireless network card is even only 10% to 20% more expensive than a normal network card. In simple terms, a wireless LAN can share an original network line with multiple computers through wireless transmission. For highly mobile users, maintaining a smooth connection between voice and data has always been a problem. Wireless LAN technology is the best solution to these problems. The popularity of wireless network technology has a lot to do with telecommunications operators in order to avoid the trouble of indoor line installation and construction, so they will use wireless network technology as a relay circuit. Today, various wireless network products such as IEEE80 2.1 lb can solve this problem for users. In addition to eliminating the trouble of physical line installation settings, users

第6頁 574655 五、發明說明(4) ,透過以無線傳輪技術取代實體線路也可避免因線路 ,,不佳而影響傳輸線路穩定性,加上新的無線網路/已大 幅間化安裝、言史定等必備工作,使用者可更輕鬆享用益線 網路%境。不過,IEEE802.1 1 b無線網路產品因規格十 不同,使用上也有不同的限制。 4 ^ 至於IEEE80 2. 1 lb無線網路技術,它是為取代傳統實 體區域網路而設計的,雖僅有數位資料傳輸頻道,但傳輸 速度可達11Mbps’傳輸範圍也從10〜1〇〇公尺不等,加上 它是無線網路產品的工業標準,這項技術的產品很多相 當適合用來架設無線網路環境。 目前已有知名網路產品公司推出多款ΙΕΕΕ8〇2· ^無 線網路產品,其中包括適用於桌上型電腦的pci無線網卡 ,筆記型電腦、桌上型電腦均可使用的USB無線網路模組 及針對筆記型電腦用戶設計的PCMC丨A無線網路卡等,如果 搭配無線網路基地台使用,還可提供數十〜數百部電腦同 時無線連線的超強功能。 適用於個人電腦使用的無線網路存取有兩種: 第一、依據IEEE 8 0 2. 1 1標準:根據IEEE 802. 1 1標 準’當服務集標識(Service Set Identifier,SSID), 及有線等效保密標準(Wired Equivalent Privacy, WEP)鍵值正確時,該無線區域網路站臺可與想連接的無 線基地臺建立連接。由於該標準的實作問題,駭客 (hacker)可利用無線區域網路封包監聽器的工具軟體,竊 聽經由無線電傳播的封包。因為中央處理器計算能力近來Page 6 574655 V. Description of the invention (4) By replacing the physical line with the wireless transmission technology, it can also avoid affecting the stability of the transmission line due to the poor line, and the new wireless network / has been greatly installed , Yanshi Ding and other necessary tasks, users can more easily enjoy the benefit of the Internet. However, due to the different specifications of IEEE802.1 1 b wireless network products, there are different restrictions on their use. 4 ^ As for the IEEE80 2.1 lb wireless network technology, it is designed to replace the traditional physical local area network. Although there are only digital data transmission channels, the transmission speed can reach 11Mbps. The transmission range is also from 10 to 100. Meters vary, and it is the industry standard for wireless networking products. Many products of this technology are quite suitable for setting up wireless networking environments. At present, well-known network product companies have launched a number of ΙΕΕΕ802 · ^ wireless network products, including pci wireless network cards for desktop computers, USB wireless networks can be used for notebook computers, desktop computers Modules and PCMC 丨 A wireless network cards designed for notebook computer users, if used with wireless network base stations, can also provide tens to hundreds of computers with wireless connectivity at the same time. There are two types of wireless network access suitable for personal computer use: First, according to the IEEE 802.1 standard: according to the IEEE 802.1 standard 'Service Set Identifier (SSID), and wired When the Wired Equivalent Privacy (WEP) key is correct, the wireless LAN station can establish a connection with the wireless base station to which it wants to connect. Due to implementation issues with the standard, hackers can use wireless LAN packet monitor tool software to eavesdrop on radio-transmitted packets. Because the CPU's computing power

574655 五、發明說明(5) 大增’如果有線等效保密標準(WEP)鍵值依然不變,當時 代進步後,用以資料加密的有線等效保密標準(WEP)鍵 值’遲早能被查到。 第二、微軟視窗作業系統支援的無線區域網路:微軟 視固作業糸統已内含I E E E 8 0 2 · 1 1 b無線區域網路標準於其 產απ線中。在微軟視窗作業系統,標準化無線區域網路驅 動程式也早已定義。 ^ 習知有四種方法適用於個人電腦的無線網路存取。 第種方法··網路信標框(β e a c 〇 n f r a m e )的安全服務集 軚識(fSID)。根據ιΕΕΕ 8〇2·丨丨無線區域網路標準,無 線,地$會周期性地,利用無線電傳送網路信標框到無線 =堂。無線站臺收到該網路信標框後,解讀其中資訊,並 決定該無線基地臺是否是它想連接的無線基地臺。框中 二Τ 參數是SSID,網路信標框的SSIDf訊可被無線基 地$隱藏而不送出。 框的;2 :疋應用程式%1 D的無線站臺,當網路信標 此一 4# # # 4 :臧時,無線站堂可連接該應用程式, 此特性促進無線網路安全水準。 ΐ, ί f ·站堂的網路卡號控制(media access 卡號,事先註冊於益:其無線站臺必須預先將其網路 線站臺未註冊於存取ί 的存取控制表中。如果該無 該未被授權之無線站2線基地臺會自動拒絕對 全漏洞:因為網路切=的要求。這種實作1,存在安 …的貧Λ傳遞沒有加密,無線網路的574655 V. Description of the invention (5) If the Wired Equivalent Privacy Standard (WEP) key value remains unchanged, when the times advance, the Wired Equivalent Privacy (WEP) key value used for data encryption will sooner or later Found. Second, the wireless LAN supported by Microsoft Windows operating system: Microsoft's Vision fixed operating system has included I E E E 80 2 · 1 1 b wireless LAN standard in its απ line. In Microsoft Windows operating systems, standardized wireless LAN drivers have also been defined. ^ There are four known methods for wireless network access for personal computers. The first method: the security service set identification (fSID) of the web beacon frame (β e a c 〇 n f r a m e). According to the wireless LAN standard of ιΕΕΕ 802 · 丨 丨 wirelessly, the ground will periodically transmit the network beacon frame to the wireless network. After the wireless station receives the network beacon frame, it interprets the information and decides whether the wireless base station is the wireless base station it wants to connect to. The second T parameter in the frame is the SSID. The SSIDf message of the network beacon frame can be hidden by the wireless base station $ without sending out. Frame: 2: 疋 App% 1 D wireless station, when the network beacon 4 # # # 4: When the station is connected, the wireless station can connect to the application, this feature promotes the wireless network security level. ΐ, ί f. The station ’s network card number control (media access card number, registered in advance: its wireless station must have its network route station not registered in the access control list of access ί. If there is no The authorized wireless station 2 base station will automatically reject the full loophole: because the network cuts = the request. This implementation of 1, there is a poor Λ transmission without encryption, the wireless network's

第8頁 574655 五、發明說明(6) 封包監聽器依然可以知到並偵測到網路卡號的位址。 第三種方法:動態鑰匙交換。基本上這種實作,複製 網際網路上虛擬私有網路(Virtual Private Network, V P N)應用的概念。根據網際網路標準,有個名叫自動金 鑰交換機制(Internet Key Exchange,IKE)的通信協定。 鍮匙產生與交換的協定都在這項標準中明白地定義,输匙 交換的專屬協定(Proprietary Protocol)定義在無線基地 臺與無線站臺之間。這種新錄匙將用於有線等效保密標準 (Wired Equivalent Privacy, WEP,定義於 IEEE 802.11) 編碼。該實作的缺點在於其為完全專屬實作,與其它I E E E 8 0 2 · 11標準產品的跨廠牌互通性沒有了。 第四種方法:身份認證伺服器(Radius Server), IEEE也建立IEEE 802·1χ標準,這項標準基本上將現有的 I ΕΕΕ 8 0 2 · 1 1無線網路從區域網路應用移轉到都會網路 (Metropolitan Area Network,MAN)應用。根據這項標 準,以產品為基礎的I ΕΕΕ 8 0 2 · 1 1技術可用於公共區域如: 機場或火車站的網際網路接取。I Ε Ε Ε 8 0 2 · 1 X提供一種驗 證通訊協定(Authentication Protocol),該驗證通訊協 定介於可攜式電腦(portable computer)無線站台與身份 認證伺服器,透過基地台供行動無線區域網路存取,圖一 為習知身份認證伺服器的機制。 圖一中,身份認證伺服器(Radius Server) 100,維持 一資料庫1 0 2,該資料庫1 0 2存放有合法使用者電腦名稱的 列表’身份認證祠服器(R a d i u s S e r v e r ) 1 0 0利用該資料庫Page 8 574655 V. Description of the invention (6) The packet monitor can still know and detect the address of the network card number. The third method: dynamic key exchange. Basically, this implementation replicates the concept of virtual private network (Virtual Private Network, VPN) applications on the Internet. According to Internet standards, there is a communication protocol called the Internet Key Exchange (IKE). The protocols for key generation and exchange are clearly defined in this standard, and the proprietary protocol for key exchange is defined between the wireless base station and the wireless station. This new key will be used for Wired Equivalent Privacy (WEP, defined in IEEE 802.11) encoding. The disadvantage of this implementation is that it is a completely proprietary implementation, and it has no cross-brand interoperability with other I E E E 80 2 · 11 standard products. The fourth method: the identity authentication server (Radius Server), the IEEE also established the IEEE 802 · 1χ standard, which basically transfers the existing I ΕΕΕ 8 0 2 · 1 1 wireless network from the local network application to Metropolitan Area Network (MAN) application. According to this standard, the product-based I ΕΕΕ 80 2 · 1 1 technology can be used for Internet access in public areas such as airports or train stations. I Ε Ε Ε 8 0 2 · 1 X provides an Authentication Protocol. The authentication protocol is between a portable computer wireless station and an authentication server. It provides mobile wireless LANs through the base station. Road access, Figure 1 shows the mechanism of a known identity authentication server. In Figure 1, the identity authentication server (Radius Server) 100 maintains a database 102, which stores a list of computer names of legitimate users' identity authentication server (R adius Server) 1 0 0Use this database

574655 五、發明說日^^ 1 〇 2,杳姑丄 網際網^網路路由器(Internet r〇uter)120透過 法了鲍傳過來,新加入無線站臺1 6 〇 (電腦)身份是否合 142 ^路中其它裝置包括··無線基地台1 40,無線基地台 線站A與無線基地台144,無線站臺162,無線站臺164,無 益室16 6 ’無線基地台1 4 0控制新加入的無線站臺1 6 〇與 …、f站臺162,無線基地台142控制無線站臺164,無線基 地台1 4 4控制無線站臺1 6 6,控制方式為透過I e E E 8 0 2 · 1 X 與無線電完成連繫,以上這些裝置相連在同一網路。 通常身份認證伺服器會將計費系統(Billing System )整合進去,因此設定與維護身份認證伺服器會花費浩 大。通常只有網路服務業者(Internet Service Provider)會為計費而設置身份認證伺服器,而身份認證 伺服器中的認證,在辦公室中的無線區域網路顯得太複雜 【發明概要】 本發明主要提供一個類似身份認證伺服器中使用的認 證機制,以供無線安全控制,再者,消除身份認證伺服器 的需求以減少網路建置的成本,第三,有效偵測入侵者並 拒絕提供不合法服務,及藉由視訊,聲音或電子郵件,通 知系統管理者有入侵者。 【發明詳細說明】 本發明主要是用於無線區域網路安全控制與入侵偵測574655 Fifth, the invention day ^^ 1 〇2, the aunt 丄 Internet ^ Internet router (Internet router) 120 passed through Bao, the newly added wireless station 16 〇 (computer) identity is 142 ^ Other devices on the road include: wireless base station 1 40, wireless base station line station A and wireless base station 144, wireless base station 162, wireless base station 164, non-profit room 16 6 'wireless base station 1 4 0 control newly added wireless base station 1 6 〇 and ..., f station 162, wireless base station 142 controls wireless station 164, wireless base station 1 4 4 controls wireless station 1 6 6 and the control method is to complete the connection with the radio through I e EE 8 0 2 · 1 X , These devices are connected to the same network. Usually the authentication server integrates the billing system, so setting up and maintaining the authentication server will cost a lot. Usually only the Internet Service Provider (Internet Service Provider) will set up an identity authentication server for billing, and the authentication in the identity authentication server appears too complicated for the wireless LAN in the office. [Summary of Invention] The present invention mainly provides An authentication mechanism similar to the one used in an authentication server for wireless security control. Furthermore, it eliminates the need for an authentication server to reduce the cost of network construction. Third, it effectively detects intruders and refuses to provide illegal Services, and notify system administrators of intruders via video, voice or email. [Detailed description of the invention] The present invention is mainly used for wireless local area network security control and intrusion detection.

574655 五、發明說明(8) 的方法,該無線區域網路其構成包括至少一有線網路與一 無線網路,請參閱圖二,本發明第一實施例適用的無線區 域網路示意圖。 構成本發明第一實施例適用的有線網路,其構成裝置 至少需提供一電子郵件伺服器(E-maii Server)210,一動 L主機5又疋通訊協定伺服器(Dhcp Server,Dynamic Host574655 5. The method of the invention description (8), the wireless local area network includes at least a wired network and a wireless network. Please refer to FIG. 2 for a schematic diagram of a wireless local area network to which the first embodiment of the present invention is applicable. To constitute a wired network applicable to the first embodiment of the present invention, the constituent device needs to provide at least an e-mail server 210 (E-maii Server) 210, a host L 5 and a protocol server (Dhcp Server, Dynamic Host)

Configuration Protocol Server) 2 2 0,一 網路管理控制 臺(Network Management Consol) 230,無線基地台 240, 無線基地台2 4 2,與無線基地台2 4 4,以上這些裝置相連在 同一有線網路。該電子郵件伺服器2丨〇主要用途是發出電 子郵件’通知糸統管理者有入侵者,該動態主機設定通訊 協定伺服器(DHCP) 2 2 0,主要應付工作有二:(1)接受 DHCP客戶端提出網路位址(Ip)租用要求,及(2)當MCp伺 服器接收到客戶端發出的網路位址(丨p )租用要求廣播後, DHCP飼服器會從那些還沒有租出的位址範圍内,選擇最前 面的空置網路位址(I P ),回應提供一個I p租用位址封包給 客戶。一網路管理控制臺(Netw〇rk Management Consol ) 2 3 0,其内部應預先建置一系統核准之合法使用者 的無線站臺電腦名稱表2 3 5,以供查核是否為合法使用者 的無線站臺電腦名稱,並據以提供服務,或是阻斷服務, 並以電^郵件,視訊,或聲音型式通知系統管理者有入侵 者,而該網路管理控制臺2 3 〇擔任本文以下工作··( 1 )接受 ,線^,台240發送出一標準SNMP Trap(簡易網路管理協 定的設定追蹤),以通知該網路管理控制臺23〇,有新無線Configuration Protocol Server) 2 2 0, a Network Management Consol 230, a wireless base station 240, a wireless base station 2 4 2 and a wireless base station 2 4 4, these devices are connected on the same wired network . The main purpose of the e-mail server 2 is to send e-mails to notify system administrators that there are intruders. The dynamic host sets the protocol server (DHCP) 2 2 0. The main tasks are: (1) Accepting DHCP The client requests a lease of the Internet address (IP), and (2) when the MCp server receives the broadcast of the lease of the Internet address (丨 p) from the client, the DHCP server will Within the range of outgoing addresses, select the foremost vacant network address (IP), and provide an IP leased address packet to the client in response. A network management console (Network Management Consol) 2 3 0, a wireless station computer name table of legal users approved by the system should be built in advance 2 3 5 for checking whether it is a wireless of legitimate users The name of the station computer and provide services based on it, or block the service, and notify the system administrator by email, video, or sound that there is an intruder, and the network management console 2 〇 performs the following tasks in this article: · (1) Accept, line ^, the station 240 sends a standard SNMP Trap (simple network management protocol setting trace) to notify the network management console 23, that there is a new wireless

574655574655

二ΐ =加:該區域網路’無線基地台240原、已管理無線 至252’無線基地台242肩已營理益绩址吉oc>l 、、、、 地a馬p — σ 原已吕理無線站量254,無線基 25^1 無線站臺2 5 6,(2)主動對新無線站臺 ☆ I出要未回報網路位址(Ip address)的要求,Two points = plus: the local network 'wireless base station 240 original, managed wireless to 252' wireless base station 242 shouldered profitability site oc > l ,,,, 地 MAPp — σ The number of wireless stations is 254, the wireless base is 25 ^ 1, the wireless station is 2 5 6, and (2) the new wireless station is proactively requested ☆ I request for an unreported network address (Ip address),

受新無線站臺2 5 Οθ郝娘I r T D A A 至口報網路位址(IP address)的訊息封包 要主動對新無線站臺25〇發出要求回報其電腦名稱的 ^ ()接义新無線站堂2 5 0回報該無線站臺電腦名稱 =訊息封包。(6)以其内部預先建置一系統核准之合法使 八者的無線站$電腦名稱表235,查核新無線站臺是否為Subject to the new wireless station 2 5 Οθ Hao Niang Ir TDAA message packet to the oral network address (IP address) to actively send a new wireless station 25 to request its computer name ^ () to connect to the new wireless station 2 50 0 Report the computer name of the wireless station = message packet. (6) Use a pre-built system to verify the wireless station's computer name table 235, and check whether the new wireless station is

合法$用者的無線站臺電腦名稱,並據以透過簡易網路管 里協疋(S Ν Μ P )’決定提供服務,或是阻斷服務,並以電子 郵件’視訊’或聲音型式通知系統管理者有入侵者。 本發明適用的無線網路部,需有複數個無線基地台, 或稱無線網路橋接器(A c c e s s Ρ 〇 i n t),負責接取並送出到 無線站臺的訊息,如無線基地台2 4 0,無線基地台2 4 2,無 線基地台2 4 4 ’以及複數個無線站臺(表示使用中的電腦)The name of the wireless station computer of the legal user, and based on the simple network management agreement (SNM), it decides to provide the service, or blocks the service, and notifies the system by email 'video' or sound type Managers have intruders. The wireless network department to which the present invention is applicable requires a plurality of wireless base stations, or wireless network bridges (Accession Point), which is responsible for receiving and sending messages to the wireless station, such as the wireless base station 2 4 0 , Wireless base station 2 4 2, wireless base station 2 4 4 ′, and multiple wireless stations (indicating a computer in use)

,如無線站臺2 5 2,無線站臺2 5 4,無線站臺2 5 6,此種類 裝置以無線電,在IEEE 80 2. 1 1通信協定下,跟無線基地 台240,242,244,連結在同一網路,本發明適用的無線 區域網路由一有線網路部與一無線網路部結合成。 圖三說明本發明方法運作步驟,其步驟如下:一、當 一新加入的無線站臺(wireless station)310有正確的服 務集標識(Service Set Identifier,SSID),及連同網 路卡號(MAC address)的有線等效保密標準(WiredFor example, wireless station 2 5 2, wireless station 2 5 4, wireless station 2 5 6. This type of device is connected to the wireless base station 240, 242, 244 by radio under the IEEE 80 2.1 communication protocol. Network, the wireless local area network applicable to the present invention is composed of a wired network section and a wireless network section. Figure 3 illustrates the operation steps of the method of the present invention. The steps are as follows: 1. When a newly added wireless station 310 has the correct Service Set Identifier (SSID), and together with the MAC address Wired Equivalent Privacy Standard

第12頁 574655 五、發明說明(ίο)Page 12 574655 V. Description of the Invention (ίο)

Equivalent Privacy^ WEP)鍵值也正確時,就在該無線 站臺310與該無線基地臺32 0間,建立連接(ass〇ciati〇n) 3 8 1 ’二、由該無線基地臺3 2 0送到該網路管理控制臺 340 ’送出一標準SNMP Trap(簡易網路管理協定的設定追 縱)382,以通知該網路管理控制臺34〇該新無線站臺31〇加 入該無線區域網路,三、由該新加入的無線站臺3丨〇向動 態主機設定通訊協定伺服器3 3 〇,發出要求網路位址(j p address)的要求383,四、當該新加入的無線站臺310於第 三步驟所發的要求383,得到動態主機設定通訊協定伺服 器3 3 0批准’該動態主機設定通訊協定伺服器3 3 〇會送回網 路位址3 8 4 ’給該新加入的無線站臺3 1 〇,五、該網路管理 控制臺3 4 0發出要求回報網路位址的要求3 8 5,給該新加入 的無線站臺3 1 0 ’六、該新加入的無線站臺3 1 0送回其網路 位址3 8 6,與給該網路管理控制臺3 4 〇,請注意,第五與第 六這兩步驟,可透過以下其中之一方式完成: (1 )發出RARP (反向位址解析協定)封包的要求,該要 求封包從該網路管理控制臺3 4 〇發出,其中該反向位址解 析協定封包有已知的網路卡號,當該無線站臺3丨〇收到來 自該網路管理控制臺3 4 0的反向位址解析協定封包要求, 會自動地對該要求,以該無線站臺3 1 0的網路位址回應。 (2 )發出要求網路位址的廣播封包到整個網路,該要 求網路位址的廣播封包係來自該網路管理控制臺3 4 0,網 路中所有無線站臺會送回代表該站臺網路的位址封包,該 網路官理控制臺3 4 0分析這些封包,基於該無線站臺的網When the Equivalent Privacy ^ WEP) key value is also correct, a connection is established between the wireless base station 310 and the wireless base station 3 0 2 (associatión) 3 8 1 '2, sent by the wireless base station 3 2 0 Go to the network management console 340 'and send a standard SNMP Trap (simple network management protocol configuration tracking) 382 to notify the network management console 34, the new wireless station 31, join the wireless local area network, 3. The newly added wireless station 3 丨 〇 sets a protocol server 3 3〇 to the dynamic host, and issues a request for a network address (jp address) 383. 4. When the newly added wireless station 310 The request issued by the three steps 383 was approved by the dynamic host setting protocol server 3 3 0 'The dynamic host setting protocol server 3 3 0 will return the network address 3 8 4' to the newly added wireless station 3 1 0, V. The network management console 3 4 0 issued a request to report the network address 3 8 5 to the newly added wireless station 3 1 0 '6. The newly added wireless station 3 1 0 Return its network address 3 8 6 and give the network management control Platform 3 4 〇, please note that the fifth and sixth steps can be completed in one of the following ways: (1) Send a RARP (Reverse Address Resolution Protocol) packet request, the request packet from the network The management console 3 400 sends out, where the reverse address resolution protocol packet has a known network card number. When the wireless station 3 receives the reverse address resolution from the network management console 3 400 The protocol packet request will automatically respond to the request with the network address of the wireless station 3 10. (2) Send a broadcast packet requesting a network address to the entire network. The broadcast packet requesting a network address is from the network management console 3 4 0, and all wireless stations in the network will return to represent the station. Address packets of the network, the network management console 340 analyzes these packets, based on the network of the wireless station

574655 五、發明說明(11) 路卡號找出該無線站臺的網路位址。 藉此,該網路管理控制臺3 4 0已經有該新加入的無線 站臺3 1 0的網路卡號與網路位址,七、該網路管理控制臺 3 4 0要求該新加入的無線站臺,回報其本身的電腦名稱3 8 7 ’八、該新加入的無線站臺3 1 0回報其本身電腦名稱3 8 8, 給該網路管理控制臺3 4 0,這動作由位於該新加入的無線 站臺3 1 0,架於驅動程式上的工具程式發出,九、該網路 管理控制臺3 4 0檢查所接獲回報的電腦名稱3 8 9,是否位於 合法使用者的無線站臺電腦名稱表中:如果否,該無線站 臺被視為非法使用者(i 1 1 e g a 1 u s e r ),該網路管理控制臺 透過SNMP (簡易網路管理協定),發出命令到該無線基地臺 3 2 0,以便拒絕對該非法無線站臺3 1 0服務,當該無線基地 臺3 2 0收到拒絕對該非法無線站臺3 1 0服務的要求後,立刻 切斷所有提供給該非法無線站臺3 1 0的交通流量(t r a f f i c ) 3 9 0 ’粗虛線部表不非法無線站堂3 1 0的服務要求被斷絕, 當該網路管理控制臺3 4 0偵測到該非法無線站臺3 1 0時,透 過電子郵件發送警示訊息3 9 1到系統管理者的工作站3 5 0, 由系統管理者的工作站3 5 0更新該警示訊息,或發出嗶嗶 聲 3 9 2。 圖四為說明本發明方法的主要步驟流程圖。當一新加 入的無線站臺(wireless station)有正確的服務集標識 (Service Set Identifier,SSID),及連同網路卡號 (MAC address)的有線等效保密標準(Wired Equivalent Pr i vacy,WEP)鍵值也正確時,就在該無線站臺與該無線574655 V. Description of the invention (11) Locate the network address of the wireless station. As a result, the network management console 3 4 0 already has the network card number and network address of the newly added wireless station 3 1 0, and the network management console 3 4 0 requests the newly added wireless station Platform, return its own computer name 3 8 7 'eight, the newly added wireless station 3 1 0 report its own computer name 3 8 8 to the network management console 3 4 0, this action is located in the newly added The wireless station 3 1 0 is issued by a tool program on the driver. 9. The network management console 3 4 0 checks the computer name 3 8 9 received, whether it is located on the wireless station computer name of a legitimate user. In the table: If not, the wireless station is considered as an illegal user (i 1 1 ega 1 user), and the network management console issues a command to the wireless base station via SNMP (Simple Network Management Protocol) 3 2 0 In order to deny service to the illegal wireless station 3 1 0, when the wireless base station 3 2 0 receives a request to deny service to the illegal wireless station 3 1 0, it immediately cuts off all provision to the illegal wireless station 3 1 0 Traffic flow (traffic) 3 9 0 The thick dotted line indicates that the service request of the illegal wireless station 3 1 0 was cut off. When the network management console 3 4 0 detects the illegal wireless station 3 1 0, it sends an alert message 3 9 1 to The system administrator's workstation 3 500, the system administrator's workstation 3 500 updates the alert message or emits a beep 3 9 2. Figure 4 is a flowchart illustrating the main steps of the method of the present invention. When a newly added wireless station (Wireless Station) has the correct Service Set Identifier (SSID) and a Wired Equivalent Pr i vacy (WEP) key along with the MAC address When the value is also correct, the wireless station communicates with the wireless station.

574655 五、發明說明(12) 基地臺間,建立連接(association)410其次,由該無線 基地臺送到該網路管理控制臺,送出一標準SNMP Trap(簡 易網路管理協定的設定追蹤),報出該網路卡號,以通知 該網路管理控制臺有該新無線站臺加入該無線區域網路 4 2 0,第三,由該新加入的無線站臺向動態主機設定通訊 協定伺服器(DHCP),發出要求網路位址(IP address)的要 求,當該要求,得到動態主機設定通訊協定伺服器(DHCP) 的批准,該動態主機設定通訊協定伺服器會送出一網路位 址,給該新加入的無線站臺4 3 0,第四,該網路管理控制 臺發出要求回報網路位址的要求,給該新加入的無線站 臺,該網路管理控制臺發出要求網路位址,給該新加入的 無線站臺,該新加入的無線站臺,回應於該網路管理控制 臺發出的要求,送回其網路位址,與給該網路管理控制 臺,本文以上要求與送回網路位址的過程,可透過以下其 中之一方式完成: (1) 發出RARP(反向位址解析協定)封包的要求,該要 求封包從該網路管理控制臺發出,其中該反向位址解析協 定封包有已知的網路卡號,當該無線站臺收到來自該網路 管理控制臺的反向位址解析協定封包要求,會自動地對該 要求,以該無線站臺的網路位址回應。 (2) 發出要求網路位址的廣播封包到整個網路,該要 求網路位址的廣播封包係來自該網路管理控制臺,網路中 所有無線站臺會送回代表該站臺網路的位址封包,該網路 管理控制臺分析這些封包,基於該無線站臺的網路卡號找574655 5. Description of the invention (12) Establish association 410 between base stations. Second, the wireless base station sends the network management console to send a standard SNMP Trap (simple network management protocol setting trace). Report the network card number to inform the network management console that the new wireless station has joined the wireless LAN 4 2 0. Third, the newly added wireless station sets a protocol server (DHCP) to the dynamic host. ) To issue a request for an IP address. When the request is approved by the dynamic host setting protocol server (DHCP), the dynamic host setting protocol server sends a network address to The newly added wireless station 430, and fourthly, the network management console issues a request to report the network address, to the newly added wireless station, the network management console issues a request for a network address, To the newly added wireless station, the newly added wireless station, in response to the request from the network management console, returns its network address, and to the network management console, this The above request and the process of returning the network address can be completed in one of the following ways: (1) Sending a RARP (Reverse Address Resolution Protocol) packet request, the request packet is sent from the network management console, The reverse address resolution protocol packet has a known network card number. When the wireless station receives a reverse address resolution protocol packet request from the network management console, it will automatically respond to the request with the wireless address. Site's network address response. (2) Send a broadcast packet requesting the network address to the entire network. The broadcast packet requesting the network address is from the network management console. All wireless stations on the network will send back the Address packets, the network management console analyzes these packets and finds them based on the network card number of the wireless station

574655 五、發明說明(13) 出該無線站臺的網路位址。 到此,該網路管理控制表 —^ 的網路卡號與網路位址,接至已經有该新加入的無線站臺 該新加入的無線站臺,回報:來,該網路管理控制臺要求 的無線站臺回報其本身電^本身的電腦名稱,該新加入 這動作由位於該新加入的:f稱:給該網路管理控制臺, 具程式發出440,第五,今’、、_站堂,架於驅動程式上的工 報的電腦名稱,是否位^\路管理控制臺檢查所接獲回 表中45 0,如果是,處理心使用者的無線站臺電腦名稱 為非法使用者⑴legal UDS=如果否’該無線站臺被視 SNMP(簡易網路管理協定路管理控制臺透過 法無線站臺服:二 非法無線站臺的交通流量所有提供給該 管理控制臺债測到該非法無線站臺時,透過電子;件 警示訊息到系統管理者的工作站,由系統管理者的工作站 更新該警不訊息,或發出嗶嗶聲470或透過電子郵件發送 警示訊息出去。 本發明第二實施例適用在同時連線的無線站台總數量 在二百以下,請參閱圖五,本發明第二實施例適用的無線 區域網路示意圖。構成第二實施例適用的有線網路,其構 成裝置至少需提供一電子郵件伺服器(E_mai丄 Server)210,一動態主機設定通訊協定伺服器(DHCp574655 V. Description of the invention (13) Give the network address of the wireless station. At this point, the network card number and network address of the network management control table— ^ are connected to the newly added wireless station and the newly added wireless station, and the report: Come, the network management console requested The wireless station reports the computer name of the computer itself. This new addition is located by the newly added: f said: to the network management console, issue a program 440, the fifth, this, _ 站 堂, The computer name of the work report on the driver is ^ \ The management console checks the received return form 45 0. If it is, the wireless station computer name of the processing user is an illegal user ⑴legal UDS = If no, the wireless station is regarded as SNMP (Simple Network Management Protocol Road Management Console through wireless station service: 2) All traffic flow of illegal wireless station is provided to the management console. When the illegal wireless station is detected, The warning message is sent to the workstation of the system manager, and the warning message is updated by the workstation of the system manager, or a beep 470 is issued or a warning message is sent out via email. In the second embodiment, the total number of wireless stations that are connected at the same time is less than two hundred. Please refer to FIG. 5. A schematic diagram of a wireless local area network to which the second embodiment of the present invention is applied. The device must provide at least an email server (E_mai 丄 Server) 210, a dynamic host configuration protocol server (DHCp

Server,Dynamic Host Configuratiorl pr〇t〇c〇lServer, Dynamic Host Configuratiorl pr〇t〇c〇l

574655 五、發明說明(14) --574655 V. Description of the invention (14)-

Server ) 22 0 網路管理控制臺(Network Management C〇nS〇 1 ) 2 3 0,無線基地台240,無線基地台242,與無線基 地台244,系統管理者的工作站35〇,以上這些裝置相連在 同一有線網路,該電子郵件伺服器2丨〇主要用途是發出電 子郵件。 第,實施例適用的無線網路部,需有複數個無線基地 口’或稱無線網路橋接器(Access p〇int),負責接取並送 出到無線站堂的訊息,如無線基地台2 4 〇,無線基地台2 4 2 ,無線基地台2 4 4,以及複數個無線站臺(表示使用中的電 腦),如無線站臺2 5 0,無線站臺252,無線站臺254,無線 站臺25 6,此種類裝置以無線電,在ΙΕΕΕ 8〇2·丨丨通信協定 下’跟無線基地台2 4 0 ’ 2 4 2,2 4 4,連結在同一網路,第 二實施例適用的無線區域網路由一有線網路部與一無線網 路部結合成。無線站臺250,無線站臺252,無線站臺254 ’無線站臺2 5 6 ’事先都各自有一份記錄合法使用者的無 線站臺電腦名稱表2 3 5。 圖六說明第二實施例運作步驟,其步驟如下:一、當 一新加入的無線站臺(wireless station)310有正確的服 務集標識(Service Set Identifier,SSID),及無線網 路卡的卡號(MAC address)已事先在無線基地臺註冊,及 有線等效保密標準(Wired Equivalent Privacy, WEP) 鍵值也正確時,就在該無線站臺3 1 0與該無線基地臺3 2 〇 間,建立連接(association)381,二、由該無線基地臺 3 2 0向新加入的無線站臺3 1 0,要求回報使用者的身份Server) 22 0 Network Management Console (Network Management 〇 〇 〇 1) 2 3 0, wireless base station 240, wireless base station 242, and wireless base station 244, system manager's workstation 35, these devices are connected In the same wired network, the main purpose of the email server 2 is to send emails. First, the wireless network department applicable to the embodiment needs to have multiple wireless base ports, or wireless network bridges (Access point), which is responsible for receiving and sending messages to the wireless station, such as wireless base station 2 4 〇, wireless base station 2 4 2, wireless base station 2 4 4, and a plurality of wireless stations (indicating the computer in use), such as wireless station 2 50, wireless station 252, wireless station 254, wireless station 25 6, This type of device is wirelessly connected to the same network with the wireless base station 2 4 0 '2 4 2, 2 4 4 under the ΙΕΕΕ 8〇2 · 丨 丨 communication protocol. The wireless local area network routing applicable to the second embodiment A wired network unit and a wireless network unit are combined. Each of wireless station 250, wireless station 252, and wireless station 254 'wireless station 2 5 6' has a wireless station computer name table 2 3 5 in which legal users are recorded in advance. Figure 6 illustrates the operation steps of the second embodiment. The steps are as follows: 1. When a newly added wireless station 310 has the correct Service Set Identifier (SSID) and the card number of the wireless network card ( (MAC address) has been registered in the wireless base station in advance, and the Wired Equivalent Privacy (WEP) key value is also correct, a connection is established between the wireless base station 3 10 and the wireless base station 3 2 0 (Association) 381, 2. The wireless base station 3 2 0 requests the newly added wireless station 3 1 0 to report the identity of the user.

第17頁 574655Page 17 574655

(identity)與通行字碼(passw〇rd) 682,三、由新加入的 無線站堂3 1 0利用一事先規定加密解密方法 身份(ldentlty)與通行字碼(passw〇rd)進行加^吏用者的 (encryption),向無線基地臺32〇,傳出加密後的身份盥 通行字碼m,無線基地臺32〇接收傳來加冑後的使用者的 身份(identity)與通行字碼(passw〇rd)結果,進行解穷 (decryption),四、無線基地臺32〇檢查所接獲回報的& 用者的身份(identity )與通行字碼(passw〇rd),是否為 合法使用者,如果否,無線站臺3丨〇被視為非法使用者 (illegal user),無線基地臺32〇立刻切斷所有提供給非 法無線站臺310的交通流量(traffic)39〇,並透過簡^網 路管理協定(SNMP)通知684,網路管理控制臺34〇:無線站 臺310為非法使用者(illegal user),五、當網路管理控 制臺3 4 0收到無線站臺3 1 〇為非法的訊息後,透過電子郵件 發送警示吼息3 9 1,通知系統管理者的工作站3 5 〇,該系統 管理者的工作站會更新該警示訊息或發出嗶嗶聲3 g 2,或 以電子郵件發送警示訊息出去。 / 圖七為第二貫施例運作流程圖,其步驟如下:一、當 一新加入無線站臺(wireless stati〇n)有正確的服務集標 識(Service Set Identifier,SSID),及無線網路卡二 卡號(MAC address)已在無線基地臺註冊,及有線等效保 密標準(Wired Equivalent Privacy, WEP)鍵值也正確 時’就在該無線站臺與該無線基地臺間,建立連接 (association)710,二、由該無線基地臺向新加入的無線(identity) and password (password) 682. Third, the newly added wireless station 3 1 0 uses a predetermined encryption and decryption method identity (ldentlty) and password (password) to be added. Encryption, transmits the encrypted identity password m to the wireless base station 32, and the wireless base station 32 receives the identity and the passw rd of the encrypted user. As a result, decryption is performed. Fourth, the wireless base station 32 checks whether the received user's identity and password are legitimate users. If not, wireless Station 3 丨 〇 is regarded as an illegal user, and wireless base station 32〇 immediately cuts off all traffic 39 provided to illegal wireless station 310, and uses Simple Network Management Protocol (SNMP) Notification 684, Network Management Console 34〇: The wireless station 310 is an illegal user. 5. When the network management console 3 4 0 receives the message that the wireless station 3 1 0 is illegal, it sends it via email. Send alert howl 3 9 1, Known system administrator workstation 35 billion, the system updates the administrator's workstation warning message or beep 3 g 2, or sending out an email alert message. / Figure 7 is the operation flow chart of the second embodiment. The steps are as follows: 1. When a new wireless station (wireless wireless) has the correct Service Set Identifier (SSID) and wireless network card When the second card number (MAC address) has been registered at the wireless base station and the Wired Equivalent Privacy (WEP) key value is also correct, 'the association is established between the wireless station and the wireless base station 710 , 2. The new wireless access point is added by the wireless base station.

第18頁 574655 五、發明說明(16) 臺,要求回報使用者身份(identity)與通行字碼 (password) 72 0,三、由新加入的無線站臺利用一事先規 定加密解密方法,將使用者的身份(identity)與通行字碼 (password)進行加密(encrypt ion),加密後傳送73〇身份 與通行字碼到無線基地臺,無線基地臺接收傳來加密後的 使用者的身份(identity)與通行字碼(passw〇rd)結果, 接收後解密(deCrypti〇n) 740,四、無線基地臺接^解密 後的使用者的身份(identity )與通行字碼(passw = d) 了 檢查是否為合法使用者750’如果否,無線站臺被視為非 法使用者(illegal user),無線基地臺立刻切斷服務76〇 ,所有提供給非法無線站臺的交通流量(traffic)不再 持,並透過簡易網路管理協定(SNMP)通知網路管理制表 770:無線站臺為非法使用者(uiegal user),五、^至 路管理控制臺收到無線站臺為非法的訊“, 田子罔 件發迗警不訊息,到系統管理者的工作站,通知 者並警示780,該系統管理者的工作站會更新該馨糸示自理 或發出嗶嗶聲,或以電子郵件發送警示訊息出去7〜 雖然文中已應用較佳實施例說明本創作,但 術者需了解可對上述實施例加以更改 :㈣本技 發明的精神及觀點,以上所述僅為本發;^ =本 例’凡依本發明申請真剎益!^ α ~ ^ m ^ 574655 圖式簡單說明 【圖式簡單說明】 圖一為習知身份認證伺服器的機制 圖二為本發明第一實施例適用的無線區域網路示意圖。 圖三為本發明第一實施例方法運作步驟。 圖四為說明本發明第一實施例方法的主要步驟流程圖。 圖五為本發明第二實施例適用的無線區域網路示意圖。 圖六為本發明第二實施例方法運作步驟。 圖七為說明本發明第二實施例方法的主要步驟流程圖。 【圖式編號說明】 10 0 身份認證伺服器(R a d i u s S e r v e r ) 102 資料庫 140 無線基地台 1 4 2 無線基地台 1 44 無線基地台 160 新加入的無線站臺 162 無線站臺 164 無線站臺 166 無線站臺 210 電子郵件伺服器 2 2 0 動態主機設定通訊協定伺服器 2 3 0 網路管理控制臺 2 3 5 合法使用者的無線站臺電腦名稱表Page 18 574655 V. Description of the invention (16) station, request to report user identity (password) 72 0, 3. The newly added wireless station uses a predetermined encryption and decryption method to decrypt the user ’s The identity and password are encrypted. After encryption, the 73 identity and the password are transmitted to the wireless base station. The wireless base station receives the encrypted user's identity and the password. (Passw〇rd) result, after receiving the decryption (deCrypti〇n) 740, four, the wireless base station received the decrypted user's identity (identity) and pass word (passw = d) to check whether it is a legitimate user 750 'If not, the wireless station is regarded as an illegal user, the wireless base station immediately cuts off the service 76, and all traffic provided to the illegal wireless station is no longer held, and it is managed through a simple network. (SNMP) Notifies the network management table 770: The wireless station is an illegal user (uiegal user). 5. The management station received a message that the wireless station was illegal. Tian Zi file sends a warning message, go to the system manager's workstation, notify the person and alert 780, the system manager's workstation will update the xinxi to take care of itself or emit a beep, or send a warning message by email ~ Although a preferred embodiment has been used to explain this creation, the artist needs to understand that the above embodiments can be modified: ㈣ The spirit and perspective of the technical invention, the above is only the present issue; ^ = This example 'fanyi The application of this invention is really good! ^ Α ~ ^ m ^ 655655 Brief description of the drawings [Simplified illustration of the drawings] Figure 1 is a mechanism of a known identity authentication server Figure 2 is a wireless local area network applicable to the first embodiment of the present invention Schematic diagram. Figure 3 shows the operational steps of the method of the first embodiment of the present invention. Figure 4 is a flowchart illustrating the main steps of the method of the first embodiment of the present invention. Figure 5 is a schematic diagram of a wireless local area network suitable for the second embodiment of the present invention. Six is the operation steps of the method according to the second embodiment of the present invention. Fig. 7 is a flowchart illustrating the main steps of the method according to the second embodiment of the present invention. [Illustration of drawing number] 10 0 Identity authentication server Radius Server) 102 database 140 wireless base station 1 4 2 wireless base station 1 44 wireless base station 160 new wireless station 162 wireless station 164 wireless station 166 wireless station 210 email server 2 2 0 dynamic host setting communication Protocol server 2 3 0 Network management console 2 3 5 Wireless station computer name table for legal users

第20頁 574655Page 574 655

第21頁 圖式簡單說明 240 無線基地台 242 無線基地台 244 無線基地台 250 無線站臺 252 無線站臺 254 無線站臺 256 無線站臺 310 新加入的無線站臺 320 無線基地臺 330 動態主機設定通訊協定伺服器 340 網路管理控制臺 350 系統管理者的工作站 381 連接 382 標準簡易網路管理協定設定追蹤 383 發出要求網路位址的要求 384 送出網路位址 385 要求網路位址 386 送回網路位址 387 要求回報電腦名稱 388 回報本身電腦名稱 389 檢查所接獲回報的電腦名稱 390 切斷給非法無線站臺交通流量 391 透過電子郵件發送警示訊息 574655 圖式簡單說明 392 更新該警示訊息或發出嗶嗶聲 410 建立連接(association) 420 回報網路卡號 430 要求DHCP分配網路位址 440 網路管理控制臺取得網路位址及電腦名稱 450 檢查合法站臺 460 通知基地台切斷服務 470 通知系統管理者並警示 682 要求回報身份與通行字碼 683 傳出加密後的身份與通行字碼 684 透過簡易網路管理協定通知 710 新站臺建立連接 720 要求回報使用者身份與通行字碼 730 加密後傳送 740 接收後解密 750 檢查是否為合法使用者 760 切斷服務 770 通知網路管理控制臺 780 通知系統管理者並警示Simple illustration on page 21 240 wireless base station 242 wireless base station 244 wireless base station 250 wireless base station 252 wireless base station 254 wireless base station 256 wireless base station 310 newly added wireless base station 320 wireless base station 330 dynamic host setting protocol server 340 Network Management Console 350 System Administrator's Workstation 381 Connection 382 Standard Simple Network Management Protocol Setting Tracking 383 Requesting Network Address Request 384 Sending Network Address 385 Requesting Network Address 386 Sending Back Network Address 387 Request computer name report 388 Report itself computer name 389 Check computer name received 390 Cut off traffic to illegal wireless station 391 Send alert message via email 574655 Schematic description 392 Update the alert message or beep 410 establish an association (association) 420 report the network card number 430 request the DHCP to assign a network address 440 the network management console to obtain the network address and computer name 450 check the legal station 460 notify the base station to cut off the service 470 notify the system administrator and Alert 682 to Report identity and password 683 Outgoing encrypted identity and password 684 Notify 710 via simple network management protocol 710 Establish connection with new station 720 Request user identity and password 730 Encrypted transmission 740 Decrypt after receiving 750 Check if it is legal User 760 Disconnect service 770 Notify network management console 780 Notify system administrator and alert

第22頁Page 22

Claims (1)

574655 六、申請專利範圍 1. 一種用於無線區域網路安全控制與入侵彳貞測的方法,該 方法包括以下步驟: (a )在一網路管理控制臺,維護一個記錄合法使用者 的無線站臺電腦名稱表,當一新加入的無線站臺 (wireless station)有正確的服務集標識(Service Set Identifier,SSID),及連同網路卡號(MAC address)的 有線等效保密標準(Wired Equivalent Privacy, WEP) 鍵值也正確時,就在該無線站臺與該無線基地臺間建立連 接(association); (b )由該無線基地臺送到該網路管理控制臺,送出一 標準SNMP Trap (簡易網路管理協定的設定追蹤),以通知 該網路管理控制臺該新無線站臺加入該無線區域網路; (c )由該新加入的無線站臺向動態主機設定通訊協定 伺服器,發出要求網路位址(IP address)的要求; (d )當該新加入的無線站臺於步驟(c )所發的要求, 得到動態主機設定通訊協定伺服器批准,該動態主機設定 通訊協定伺服器會送出網路位址,給該新加入的無線站 臺; (e )該網路管理控制臺發出要求網路位址,給該新加 入的無線站臺; (f )該新加入的無線站臺送回網路位址,給該網路管 理控制臺,其中步驟(e )與步驟(f )這兩步驟可透過以下其 中之一方式完成: (1)發出RARP (反向位址解析協定)封包的要求,574655 VI. Scope of Patent Application 1. A method for wireless local area network security control and intrusion detection, the method includes the following steps: (a) in a network management console, maintain a wireless record of legitimate users Platform computer name table, when a newly added wireless station (wireless station) has the correct Service Set Identifier (SSID), and Wired Equivalent Privacy (MAC) When the WEP key value is also correct, an association is established between the wireless base station and the wireless base station; (b) the wireless base station sends the wireless base station to the network management console and sends a standard SNMP Trap (simple network Tracking of the network management protocol) to notify the network management console that the new wireless station joins the wireless local area network; (c) the newly added wireless station sets a protocol server to the dynamic host and sends a request network Address (IP address) requirements; (d) when the newly added wireless station requests in step (c), the dynamic host setting communication protocol is obtained The server approves, the dynamic host setting protocol server will send a network address to the newly added wireless station; (e) the network management console sends a request for the network address to the newly added wireless station ; (F) the newly added wireless station returns the network address to the network management console, wherein step (e) and step (f) can be completed in one of the following ways: (1) Request a RARP (Reverse Address Resolution Protocol) packet, 第23頁 574655 六、申請專利範圍 該要求封包從該網路管理控制臺發出,其中 該反向位址解析協定封包有已知的網路卡 號,當該無線站臺收到來自該網路管理控制 臺的反向位址解析協定封包要求,會自動地 對該要求回應該無線站臺的網路位址; (2)發出要求網路位址的廣播封包到整個網路, 該要求網路位址的廣播封包係來自該網路管 理控制臺,網路中所有站臺會送回代表該站 臺網路的位址封包,該網路管理控制臺分析 這些封包,基於該無線站臺的網路卡號找出 該無線站臺的網路位址; 藉此,該網路管理控制臺已經有該新加入的無線站臺 的網路卡號與網路位址; (g) 該網路管理控制臺要求該新加入的無線站臺,回 報其本身的電腦名稱; (h) 該新加入的無線站臺回報本身的電腦名稱,給該 網路管理控制臺,這動作由位於該新加入的無線站臺,架 於驅動程式上的工具程式發出; (i )該網路管理控制臺檢查所接獲回報的電腦名稱, 是否位於合法使用者的無線站臺電腦名稱表中: 如果否,該無線站臺被視為非法使用者(i 1 1 ega 1 user),該網路管理控制臺透過SNMP(簡易網路管理協 定),發出命令到該無線基地臺,以便拒絕對該非法無線 站臺服務,當該無線基地臺收到拒絕對該非法無線站臺服Page 23 574655 6. The scope of the patent application The request packet is sent from the network management console. The reverse address resolution protocol packet has a known network card number. When the wireless station receives the packet from the network management control, The station ’s reverse address resolution protocol packet request automatically responds to the request ’s network address of the wireless station; (2) sends a broadcast packet requesting the network address to the entire network, which requests the network address The broadcast packets are from the network management console. All stations in the network will return address packets representing the network of the site. The network management console analyzes these packets and finds out based on the network card number of the wireless station. The network address of the wireless station; thereby, the network management console already has the network card number and network address of the newly added wireless station; (g) the network management console requests the newly added The wireless station reports its own computer name; (h) The newly added wireless station reports its own computer name to the network management console. This action is located at the newly added wireless station. The utility program issued on the driver is issued; (i) The network management console checks whether the computer name received is located in the wireless station computer name table of the legitimate user: if not, the wireless station is regarded as Illegal user (i 1 1 ega 1 user), the network management console sends a command to the wireless base station through SNMP (Simple Network Management Protocol), so as to deny service to the illegal wireless base station, when the wireless base station Received refusal to serve the illegal wireless station 第24頁 574655 六、申請專利範圍 務的要求後,立刻切斷所有提供給該非法無線站臺的交通 流量(t r a f f i c ); (j )當該網路管理控制臺偵測到該非法無線站臺時, 通知系統管理者的工作站,該系統管理者的工作站會顯示 警示訊息,發出嗶嗶聲,或透過電子郵件發送警示訊息出 去。 2. 如申請專利範圍第1項所述的方法,其中該方法需預先 連接該電子郵件伺服器,該動態主機設定通訊協定伺服 器,該網路管理控制臺,該系統管理者的工作臺,與該複 數個無線基地臺,於同一區域網路。 3. 如申請專利範圍第1項所述的方法,進一步容許複數個 無線基地臺與複數個無線站臺間,可以透過無線電波與 IEEE 8 0 2. 1 1通信標準,彼此完成連接。 4. 如申請專利範圍第1項所述的方法,其中該網路管理控 制臺包括: 至少一含合法使用者的無線站臺電腦名稱表。 5. 如申請專利範圍第1項所述的方法,其中該無線站臺包 括: 一膝上型電腦及其射頻通訊裝置; 一筆記型電腦及其射頻通訊裝置;或Page 24 574655 6. Immediately after requesting patent coverage, cut off all traffic provided to the illegal wireless station (traffic); (j) When the network management console detects the illegal wireless station, Notify the system administrator's workstation. The system administrator's workstation will display a warning message, emit a beep, or send a warning message via email. 2. The method as described in item 1 of the scope of patent application, wherein the method requires pre-connection to the email server, the dynamic host setting protocol server, the network management console, and the system administrator's workbench, And the plurality of wireless base stations are in the same local area network. 3. The method described in item 1 of the scope of patent application further allows multiple wireless base stations and multiple wireless stations to connect to each other through radio waves and the IEEE 802.11.1 communication standard. 4. The method according to item 1 of the scope of patent application, wherein the network management console includes: at least one wireless station computer name table containing legal users. 5. The method according to item 1 of the scope of patent application, wherein the wireless station comprises: a laptop computer and its radio frequency communication device; a notebook computer and its radio frequency communication device; or 574655 六、申請專利範圍 一掌上型電腦及其射頻通訊裝置。 6 · —種用於無線區域網路安全控制與入侵偵測的方法,該 方法包括以下步驟: (a )提供複數個無線基地臺,在每一無線基地臺,都事 先維護一個各別記錄合法使用者的無線站臺電腦名稱表, 當一新加入的無線站臺(wireless stati〇n)有正確的服務 集標識(Service Set Identifier,SSID),及連同網路 卡號(MAC address)的有線等效保密標準(Wi red Equivalent Privacy ’ WEP)鍵值也正確時,就在該無線 站臺與4無線基地臺間建立連接(ass〇ciati〇n); (b )該無線基地臺要求該新加入的無線站臺,回報該無 線站堂使用者的身份(ident i ty )與通行字碼(passw〇rd); (c )該新加入的無線站臺回報使用者的身份 (i d e n t i t y )與通行字碼(p a s s w 〇 r ^),給該無線基地臺; (d )該無線基地臺檢查所接獲回報的使用者的身份 (identity)與通行字碼(passw〇rd),是否為合法使用者: 如果否’該無線站臺被視為非法使用者(i丨legal user), 該無線基地臺立刻切斷所有提供給該非法無線站臺的交通 流量(traffic),並透過簡易網路管理協定(SNMp),通知 網路官理控制臺:該無線站臺為非法使用者(丨丨丨ega 1 user); (e)當該網路管理控制臺收到該無線站臺為非法的訊 息後’通知系統管理者的工作站,該系統管理者的工作站574655 VI. Scope of patent application A palmtop computer and its RF communication device. 6-A method for wireless local area network security control and intrusion detection, the method includes the following steps: (a) providing a plurality of wireless base stations, each of which maintains a separate record in advance The user ’s wireless station computer name list, when a newly added wireless station (wireless wireless) has the correct Service Set Identifier (SSID), and the wired equivalent confidentiality along with the MAC address When the standard (Wi red Equivalent Privacy 'WEP) key value is also correct, a connection is established between the wireless station and 4 wireless base stations (ass〇ciati〇n); (b) the wireless base station requires the newly added wireless station To report the identity of the user of the wireless station (ident i ty) and the pass code (passw〇rd); (c) The newly added wireless station reports the identity of the user and the pass code (passw 〇r ^) To the wireless base station; (d) The wireless base station checks whether the identity (identity) and password (passw〇rd) of the user who has received the report is a legitimate user: if not The wireless station is regarded as an illegal user. The wireless base station immediately cuts off all traffic provided to the illegal wireless station and notifies the network through the Simple Network Management Protocol (SNMp). Road management console: the wireless station is an illegal user (丨 丨 丨 ega 1 user); (e) when the network management console receives a message that the wireless station is illegal, 'notify the system administrator's workstation, The system administrator's workstation 第26頁 574655 六、申請專利範圍 會顯不警示訊息,發出嗶嗶聲,或透過電子郵件發送鑿 λ息出去。 •如申請專利範圍第6項所述的方法,其中該方法需預先 =接該電子郵件伺服器,該動態主機設定通訊協定伺服 杰’该網路管理控制臺,該系統管理者的工作站,與該複 數個無線基地臺,於同一區域網路。 8·如申請專利範圍第6項所述的方法,其中該電腦名稱表 包括: 至少一合法使用者的服務集標識(Service set Identifier’ SSID) ’與至少一個合法使用者的連同網路 卡號(MAC add res s)的有線等效保密標準(Wired Equivalent Privacy ’ WEP)鍵值。 9 ·如申請專利範圍第6項所述的方法,其中更包含該新加 入的無線站臺將使用者的身份(identity)與通行字碼 (password)加密回報傳給該無線基地臺的步驟: (a)提供一加密解密方法,該新加入的無線站臺將使 用者的身伤(identity)與通行字碼(password)進行加密; (b )該新加入的無線站臺,將使用者的身份 (i d e n t i t y)與通行字碼(p a s s w 〇 r d)加密後的結果,傳給該 無線基地堂; (c )該無線基地臺接收該新加入的無線站臺,傳來的Page 26 574655 VI. Scope of patent application No warning message will be displayed, a beep sound will be issued, or a message will be sent out via email. • The method as described in item 6 of the scope of patent application, wherein the method needs to be connected in advance to the email server, the dynamic host setting protocol server, the network management console, the system administrator's workstation, and The plurality of wireless base stations are in the same local area network. 8. The method according to item 6 of the scope of patent application, wherein the computer name table includes: a service set identifier (SSID) of at least one legal user and at least one legal user together with a network card number ( MAC add res s) Wired Equivalent Privacy 'WEP' key value. 9. The method according to item 6 of the scope of patent application, further comprising the step of transmitting the user's identity and password encrypted report by the newly added wireless station to the wireless base station: (a ) Provide an encryption and decryption method. The newly added wireless station encrypts the user's identity and password; (b) the newly added wireless station encrypts the user's identity and The encrypted result of the pass code (passw 〇rd) is transmitted to the wireless base station; (c) The wireless base station receives the newly added wireless station. 第27頁 574655 六、申請專利範圍 使用者的身份 (identity)與通行字碼(password)加密後 的結果,進行解密。 1 0 .如申請專利範圍第6項所述的方法,進一步容許複數個 無線基地臺與複數個無線站臺間,可以透過無線電波與 IEEE8 0 2. 1 1通信標準,彼此完成連接。 1 1.如申請專利範圍第6項所述的方法,其中該無線站臺包 括: 一膝上型電腦及其射頻通訊裝置; 一筆記型電腦及其射頻通訊裝置;或 一掌上型電腦及其射頻通訊裝置。Page 27 574655 VI. Patent Application Scope The user's identity and password are encrypted and decrypted. 10. The method described in item 6 of the scope of the patent application further allows multiple wireless base stations and multiple wireless stations to connect to each other through radio waves and the IEEE 802.1 communication standard. 1 1. The method according to item 6 of the scope of patent application, wherein the wireless station comprises: a laptop computer and its radio frequency communication device; a notebook computer and its radio frequency communication device; or a palmtop computer and its radio frequency Communication device. 第28頁Page 28
TW91108420A 2002-04-24 2002-04-24 A WLAN network security control and intrusion detection method TW574655B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW91108420A TW574655B (en) 2002-04-24 2002-04-24 A WLAN network security control and intrusion detection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW91108420A TW574655B (en) 2002-04-24 2002-04-24 A WLAN network security control and intrusion detection method

Publications (1)

Publication Number Publication Date
TW574655B true TW574655B (en) 2004-02-01

Family

ID=32734129

Family Applications (1)

Application Number Title Priority Date Filing Date
TW91108420A TW574655B (en) 2002-04-24 2002-04-24 A WLAN network security control and intrusion detection method

Country Status (1)

Country Link
TW (1) TW574655B (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7665138B2 (en) 2004-12-27 2010-02-16 Industrial Technology Research Institute Detecting method and architecture thereof for malicious codes
TWI418386B (en) * 2007-10-02 2013-12-11 Legend Entertainment Co Ltd X Ip address-locking system of on-line game and method thereof
US9294503B2 (en) 2013-08-26 2016-03-22 A10 Networks, Inc. Health monitor based distributed denial of service attack mitigation
US9537886B1 (en) 2014-10-23 2017-01-03 A10 Networks, Inc. Flagging security threats in web service requests
US9584318B1 (en) 2014-12-30 2017-02-28 A10 Networks, Inc. Perfect forward secrecy distributed denial of service attack defense
US9621575B1 (en) 2014-12-29 2017-04-11 A10 Networks, Inc. Context aware threat protection
US9722918B2 (en) 2013-03-15 2017-08-01 A10 Networks, Inc. System and method for customizing the identification of application or content type
US9756071B1 (en) 2014-09-16 2017-09-05 A10 Networks, Inc. DNS denial of service attack protection
US9787581B2 (en) 2015-09-21 2017-10-10 A10 Networks, Inc. Secure data flow open information analytics
US9838425B2 (en) 2013-04-25 2017-12-05 A10 Networks, Inc. Systems and methods for network access control
US9848013B1 (en) 2015-02-05 2017-12-19 A10 Networks, Inc. Perfect forward secrecy distributed denial of service attack detection
US9900343B1 (en) 2015-01-05 2018-02-20 A10 Networks, Inc. Distributed denial of service cellular signaling
US9906422B2 (en) 2014-05-16 2018-02-27 A10 Networks, Inc. Distributed system to determine a server's health
US9912555B2 (en) 2013-03-15 2018-03-06 A10 Networks, Inc. System and method of updating modules for application or content identification
US10044582B2 (en) 2012-01-28 2018-08-07 A10 Networks, Inc. Generating secure name records
US10063591B1 (en) 2015-02-14 2018-08-28 A10 Networks, Inc. Implementing and optimizing secure socket layer intercept
US10187377B2 (en) 2017-02-08 2019-01-22 A10 Networks, Inc. Caching network generated security certificates
US10250475B2 (en) 2016-12-08 2019-04-02 A10 Networks, Inc. Measurement of application response delay time
US10341118B2 (en) 2016-08-01 2019-07-02 A10 Networks, Inc. SSL gateway with integrated hardware security module
US10382562B2 (en) 2016-11-04 2019-08-13 A10 Networks, Inc. Verification of server certificates using hash codes
US10397270B2 (en) 2017-01-04 2019-08-27 A10 Networks, Inc. Dynamic session rate limiter
US10469594B2 (en) 2015-12-08 2019-11-05 A10 Networks, Inc. Implementation of secure socket layer intercept
US10812348B2 (en) 2016-07-15 2020-10-20 A10 Networks, Inc. Automatic capture of network data for a detected anomaly

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7665138B2 (en) 2004-12-27 2010-02-16 Industrial Technology Research Institute Detecting method and architecture thereof for malicious codes
TWI418386B (en) * 2007-10-02 2013-12-11 Legend Entertainment Co Ltd X Ip address-locking system of on-line game and method thereof
US10044582B2 (en) 2012-01-28 2018-08-07 A10 Networks, Inc. Generating secure name records
US9912555B2 (en) 2013-03-15 2018-03-06 A10 Networks, Inc. System and method of updating modules for application or content identification
US10594600B2 (en) 2013-03-15 2020-03-17 A10 Networks, Inc. System and method for customizing the identification of application or content type
US10708150B2 (en) 2013-03-15 2020-07-07 A10 Networks, Inc. System and method of updating modules for application or content identification
US9722918B2 (en) 2013-03-15 2017-08-01 A10 Networks, Inc. System and method for customizing the identification of application or content type
US10581907B2 (en) 2013-04-25 2020-03-03 A10 Networks, Inc. Systems and methods for network access control
US10091237B2 (en) 2013-04-25 2018-10-02 A10 Networks, Inc. Systems and methods for network access control
US9838425B2 (en) 2013-04-25 2017-12-05 A10 Networks, Inc. Systems and methods for network access control
US10187423B2 (en) 2013-08-26 2019-01-22 A10 Networks, Inc. Health monitor based distributed denial of service attack mitigation
US9860271B2 (en) 2013-08-26 2018-01-02 A10 Networks, Inc. Health monitor based distributed denial of service attack mitigation
US9294503B2 (en) 2013-08-26 2016-03-22 A10 Networks, Inc. Health monitor based distributed denial of service attack mitigation
US9906422B2 (en) 2014-05-16 2018-02-27 A10 Networks, Inc. Distributed system to determine a server's health
US10686683B2 (en) 2014-05-16 2020-06-16 A10 Networks, Inc. Distributed system to determine a server's health
US9756071B1 (en) 2014-09-16 2017-09-05 A10 Networks, Inc. DNS denial of service attack protection
US9537886B1 (en) 2014-10-23 2017-01-03 A10 Networks, Inc. Flagging security threats in web service requests
US9621575B1 (en) 2014-12-29 2017-04-11 A10 Networks, Inc. Context aware threat protection
US10505964B2 (en) 2014-12-29 2019-12-10 A10 Networks, Inc. Context aware threat protection
US9584318B1 (en) 2014-12-30 2017-02-28 A10 Networks, Inc. Perfect forward secrecy distributed denial of service attack defense
US9900343B1 (en) 2015-01-05 2018-02-20 A10 Networks, Inc. Distributed denial of service cellular signaling
US9848013B1 (en) 2015-02-05 2017-12-19 A10 Networks, Inc. Perfect forward secrecy distributed denial of service attack detection
US10834132B2 (en) 2015-02-14 2020-11-10 A10 Networks, Inc. Implementing and optimizing secure socket layer intercept
US10063591B1 (en) 2015-02-14 2018-08-28 A10 Networks, Inc. Implementing and optimizing secure socket layer intercept
US9787581B2 (en) 2015-09-21 2017-10-10 A10 Networks, Inc. Secure data flow open information analytics
US10469594B2 (en) 2015-12-08 2019-11-05 A10 Networks, Inc. Implementation of secure socket layer intercept
US10812348B2 (en) 2016-07-15 2020-10-20 A10 Networks, Inc. Automatic capture of network data for a detected anomaly
US10341118B2 (en) 2016-08-01 2019-07-02 A10 Networks, Inc. SSL gateway with integrated hardware security module
US10382562B2 (en) 2016-11-04 2019-08-13 A10 Networks, Inc. Verification of server certificates using hash codes
US10250475B2 (en) 2016-12-08 2019-04-02 A10 Networks, Inc. Measurement of application response delay time
US10397270B2 (en) 2017-01-04 2019-08-27 A10 Networks, Inc. Dynamic session rate limiter
USRE47924E1 (en) 2017-02-08 2020-03-31 A10 Networks, Inc. Caching network generated security certificates
US10187377B2 (en) 2017-02-08 2019-01-22 A10 Networks, Inc. Caching network generated security certificates

Similar Documents

Publication Publication Date Title
TW574655B (en) A WLAN network security control and intrusion detection method
US20030200455A1 (en) Method applicable to wireless lan for security control and attack detection
JP3869392B2 (en) User authentication method in public wireless LAN service system and recording medium storing program for causing computer to execute the method
US8191124B2 (en) Systems and methods for acquiring network credentials
US8345881B2 (en) Communication system, information processing apparatus, method and computer program
JP4657619B2 (en) Information processing apparatus and access right management method
JP2006197025A (en) Security group managing system
JP2003242123A (en) Conference type access control method
TW201224775A (en) Dynamic account creation with secured hotspot network
JP2012186516A (en) Wireless lan device setting system
US20070258415A1 (en) Handshake method for wireless client
JP2004145858A (en) Server device
CA2647684A1 (en) Secure wireless guest access
WO2008030527A2 (en) Systems and methods for acquiring network credentials
CN100502300C (en) Method for detecting illegally cut-in point in radio local network
JP2002271318A (en) Radio communication equipment and certification managing server
KR20030053280A (en) Access and Registration Method for Public Wireless LAN Service
JP4303905B2 (en) Wireless communication system switching device
JP4574122B2 (en) Base station and control method thereof
JP2004032336A (en) Network connection management system and method therefor
JP2005038099A (en) Information equipment for configuring wireless network, and program
KR20110013038A (en) Web based authentication method for wireless internet access service at business places
JP4915463B2 (en) Information processing device
JP2011077691A (en) Device, method and program for relaying radio communication
EP2769520B1 (en) Access method and communication system for accessing a protected communication service