WO2012051858A1 - 一种接入点及无线工作站安全连接接入点的方法 - Google Patents

一种接入点及无线工作站安全连接接入点的方法 Download PDF

Info

Publication number
WO2012051858A1
WO2012051858A1 PCT/CN2011/075170 CN2011075170W WO2012051858A1 WO 2012051858 A1 WO2012051858 A1 WO 2012051858A1 CN 2011075170 W CN2011075170 W CN 2011075170W WO 2012051858 A1 WO2012051858 A1 WO 2012051858A1
Authority
WO
WIPO (PCT)
Prior art keywords
wps
connection
access point
module
sta
Prior art date
Application number
PCT/CN2011/075170
Other languages
English (en)
French (fr)
Inventor
侯书朋
马涛
李迎新
刘昕颖
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2012051858A1 publication Critical patent/WO2012051858A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the present invention relates to the field of wireless local area networks, and in particular, to a method for an access point and a wireless workstation to securely connect an access point.
  • the current wireless local area network technology is widely used in home networks. Users connect the computer to the access point in the home network through the wireless workstation, replacing the traditional wired connection, eliminating the trouble of wiring and being very convenient to use. Due to the openness of the wireless network, any access point can connect to the network cable when the wireless network is not encrypted, which brings great security risks to the user. Setting the encryption method for the wireless network brings a certain threshold to ordinary users who do not have wireless expertise. In the traditional way, when creating a new secure wireless network, the user needs to manually set the network name (SSID) and security key at the access point, and then enter the security key on the computer with the wireless workstation to access the wireless. Network, the entire process users need to have basic background knowledge of wireless network device operation and the ability to modify the necessary configuration. Obviously, it is more difficult for users without professional knowledge to achieve it.
  • SSID network name
  • Step 1 Before the wireless STA (station) and the AP (access point) start the PBC, the STA sends a probe request (probing request frame) without PBC information, that is, the WSC IE in the probe request at this time (the WSC is called Wi- Fi Simple Config (Wi-Fi Simple Settings), equivalent to WPS, IE is called Information Element). It does not contain PBC. It is used to find APs that can provide access functions around.
  • Step 2 After receiving the information, the AP responds with a probe response (with a probe response frame) without PBC information;
  • Step 3 The AP presses the PBC button to provide WPS connection access to the PBC.
  • Step 4 Since the STA does not press the PBC at this time, the probe request without the PBC information is still sent;
  • Step 5 at this time, the AP replies with the same information as step 2;
  • Step 6 The STA presses the PBC button, and the sent probe request contains the PBC information, that is, the WSC IE in the probe request sent at this time includes the PBC information, indicating that the PBC access is performed this time, and the AP is notified that the STA has been opened. PBC operation;
  • Step 7 the AP's reply frame also carries PBC information, and the STA is notified that the AP also provides
  • Step 8 The AP and the STA complete the connection through the registration protocol.
  • step 6 if the illegal user detects that the AP provides the PBC service, before the legitimate user presses the button, the probe request with the PBC information is preemptively sent, then the AP does not perform any verification. Operation, directly according to the wps registration protocol, illegal users are connected to the network, and legitimate users are excluded from the network, which brings serious security risks.
  • the WPS protocol is a public protocol
  • the wps-compliant access point will follow the wps protocol processing process, and any workstation can successfully access the access point as long as it conforms to the wps access specification.
  • the access point cannot distinguish whether the workstation connected through wps is a legitimate user or an illegal user, which brings great hidden dangers to the network.
  • the object of the present invention is to provide a method for an access point and a wireless workstation to securely connect to an access point, so that the user can quickly and conveniently access the network by using wps while ensuring the security of the wireless network.
  • the present invention provides a method for a wireless workstation (STA) to securely connect an access point (AP), including:
  • the AP starts counting after the WPS connection is turned on. At the same time, and the WPS connection is not performed within the timed period, after the timing time is reached, if this is the case, the current WPS connection process is terminated.
  • WPS Wi-Fi Protected Setup
  • the method further includes: after the timing time arrives, if the AP detects that only one STA has opened the WPS connection within the timeout period, the WPS connection is completed with the STA.
  • the method further includes: the AP performing an alarm while terminating the WPS connection process.
  • the timing is greater than or equal to 30 seconds and less than or equal to 60 seconds.
  • the method further includes: the AP detecting, according to the source MAC address carried in the probe request frame sent by the STA, the number of STAs that have opened the WPS connection in the timed period.
  • the present invention also provides an access point (AP), including a timing module, a connection module, and a judging module, wherein:
  • the timing module is configured to: in a WPS (Wi-Fi Protected Setup) connection process, when the AP turns on the WPS connection, starts timing;
  • WPS Wi-Fi Protected Setup
  • the connection module is configured to: not perform a WPS connection within a time period;
  • the judging module is configured to: after the timing time arrives, if two or more STAs in the timing period are detected to have the WPS connection enabled, the WPS connection process is terminated.
  • the determining module is further configured to: after the timing time arrives, if only one STA detects that the WPS connection is enabled within the timeout period, the connection module is triggered; the connection module is further configured to: After the trigger, the WPS connection is completed with the STA.
  • the AP further includes an alarm module configured to perform an alarm when the determining module terminates the current WPS connection process.
  • the timing is greater than or equal to 30 seconds and less than or equal to 60 seconds.
  • the determining module is further configured to: according to the source carried in the probe request frame sent by the received STA
  • the MAC address is used to detect the number of STAs that have WPS connections enabled during the time period.
  • the invention can prevent an illegal user from accessing an access point that initiates a wps connection process through an open wps protocol, and for an ordinary user who does not have knowledge of wireless security settings, when using a simple wps button to access the network, preventing illegal users from using wps
  • the public protocol is simultaneously accessed to ensure a secure connection to the wireless network.
  • FIG. 1 is a schematic diagram of a wps connection in the prior art
  • FIG. 2 is a schematic diagram of a wps connection according to an embodiment of the present invention.
  • FIG. 3 is a flow chart of an embodiment of the present invention. Preferred embodiment of the invention
  • the AP starts timing after the WPS connection is enabled, and does not perform the WPS connection within the timeout period. After the timing time arrives, if the AP detects that there are two or more STAs in the timeout period. (Workstation) Turns on the WPS connection and terminates the WPS connection process.
  • the STA After the aging time is reached, if the AP detects that only one STA has enabled the WPS connection within the timeout period, the STA is allowed to perform a WPS connection, that is, the WPS connection is completed with the STA.
  • the AP terminates the WPS connection process and also performs an alarm.
  • the timing is a preset delay time on the AP, preferably 30 seconds or more and less than 60 seconds.
  • the AP still responds to the probe response without the PBC information after receiving the probe resquest message with the PBC information (the PBC information is used to indicate that the WPS connection is initiated in the PBC mode). Text.
  • the STA and the AP do not initiate the WPS connection, and the AP can pass the source MAC carried in the probe resquest message.
  • the STA sends a probe request packet to the AP to determine whether there is an unauthorized unauthorized user.
  • a wps connection request was made.
  • a wireless access point is included in the home gateway, and the access point can also implement the above method while supporting the standard wps specification.
  • User 1 uses the wps specification when using the access point, press the wps button on the access point, and the access point starts the wps connection process, waiting for the user to access.
  • User 2 can press the PBC button on the workstation.
  • the access point After waiting for a delay time, the access point only detects that one user has performed a wps connection, thereby determining that the workstation that initiated the wps connection is a legitimate user, allowing the The user associates. If an illegal user detects that an access point has enabled the wps connection, and simultaneously presses the PBC button or by other means, according to the wps standard processing flow, the wps connection with the access point is opened, and the wps information is sent.
  • the element's probe request message at this time, the legitimate user also accesses the wps protocol flow to connect with the access point, and also sends a probe request connection message with the wps information element, and the access point can detect
  • Step 201 Before starting the PBC, the STA sends a probe request without PBC information, and is used to find an AP that can provide access functions around;
  • Step 202 After receiving the information, the AP responds by using a probe response without PBC information.
  • Step 203 The AP presses the PBC button to provide wps connection access, and starts timing according to the set delay time;
  • Step 204 If the STA does not press the PBC at this time, the probe request without the PBC information is still sent;
  • Step 205 At this time, the AP still responds to the probe response without the PBC information;
  • Step 206 The STA presses the PBC button, and the sent probe request includes PBC information, and announces to the AP that the STA has opened the WPS connection;
  • Step 207 The AP determines that the delay time has not arrived, and returns the STA to the STA without the PBC information. Probe response;
  • Step 208 The AP receives a probe request sent by another STA, where the PBC information is included.
  • Step 209 The AP determines that the delay time arrives, records a probe request that includes the PBC information received within the delay time, and analyzes and obtains the originating robe. If the number of STAs of the request message is greater than or equal to 2, it is considered that an illegal user tries to connect, ends the wps connection process, and performs an alarm (for example, by LED display). If the judgment is equal to 1, it is considered that no illegal user connection is found. Then, the probe responds with the PBC information to the one STA, and performs step 210.
  • the AP determines the number of STAs to try to connect according to the MAC address in all the received probe request messages. For example, if there are multiple probe request packets, if the source MAC addresses in these packets are the same, it means that only one STA has started the WPS connection.
  • Step 210 The AP and the STA complete the WPS connection between the STA and the AP according to a normal procedure by using a registration protocol.
  • Step 301 The user presses PBC, and the AP initiates a wps connection.
  • Step 302 Start timing according to a preset timing time
  • Step 303 If receiving a probe request including PBC information sent by the STA, replying to the robe response without the PBC information, and recording the received robe request;
  • Step 304 after the timing time arrives, it is determined according to the recorded probe request whether there are two or more STAs for wps connection, and if yes, step 305 is performed, if only one STA performs wps connection, step 306 is performed;
  • Step 305 closing the wps program, and alarming, ending;
  • Step 306 wps accesses the legal user, and ends.
  • the access point for implementing the above method includes a timing module, a connection module, and a judging module, wherein: the timing module is configured to: in the WPS connection process, when the AP starts the WPS connection, starts timing; The connection module does not perform a WPS connection within a time period;
  • the judging module is configured to: after the timing time arrives, if two or more STAs in the timing period are detected to have the WPS connection enabled, the WPS connection process is terminated.
  • the determining module is further configured to: after the timing time arrives, if only one STA in the timeout period detects that the WPS connection is enabled, the connection module is triggered;
  • connection module completes the WPS connection with the STA after being triggered by the determination module.
  • the AP further includes an alarm module configured to perform an alarm when the determining module terminates the current WPS connection process.
  • the determining module is based on the source carried in the probe request frame sent by the received STA.
  • the MAC address is used to detect the number of STAs that have WPS connections enabled during the time period.
  • the present invention can prevent an illegal user from accessing an access point that initiates a wps connection process through the public wps protocol, thereby ensuring a secure connection of the wireless network.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明提供一种接入点及无线STA安全连接接入点的方法,该方法包括:在WPS连接过程中,AP在开启WPS连接后开始计时,并且在计时时间内不进行WPS连接,在所述计时时间到达后,如果所述AP检测到所述计时时间内有两个或者有两个以上的STA开启了WPS连接,则终止本次WPS连接过程。与现有技术相比,本发明可以防止非法用户通过公开的wps协议接入启动wps连接过程的接入点,保证了无线网络的安全连接。

Description

一种接入点及无线工作站安全连接接入点的方法
技术领域
本发明涉及无线局域网领域, 具体涉及一种接入点及无线工作站安全连 接接入点的方法。
背景技术
当前无线局域网技术广泛应用于家庭网络, 用户通过无线工作站将计算 机连接到家庭网络中的接入点, 取代传统的有线连接的方式, 省却了布线的 烦恼, 使用十分方便。 由于无线网络的开放性, 任何接入点在无线网路没有 加密的情况下, 均能连接到网线网络, 给用户带来了极大的安全隐患。 而给 无线网络设置加密方式, 却又给不具备无线专业知识的普通用户带来了一定 门槛。 在传统方式下, 用户在新建一个安全的无线网络时, 需要在接入点手 动设置网络名 (SSID )和安全密钥, 然后在安装有无线工作站的计算机上输 入安全密钥才能接入该无线网络, 整个过程用户需要具备无线网络设备操作 的基本背景知识和修改必要配置的能力。显然对于毫无专业知识的用户来说, 实现起来是比较困难的。
为了解决这个问题, Wi-Fi联盟提出了 WPS ( Wi-Fi Protected Setup, Wi-Fi 保护设置)认证项目。 通过 WPS方式用户可以在不具备专业知识的情况下, 只需按下 PBC ( Push Button Configuration, 按钮设置)按钮, 即能安全地连 入无线网络。 这大大简化了无线安全设置的操作。 但是这种方法具有严重的 安全隐患。 根据《 Wi-Fi Protected Setup Specification》 , 图 1简单描述了 wps 协议的连接方式。 如图 1所示, wps的基本工作流程如下:
步骤 1、 无线 STA (工作站)和 AP (接入点 )启动 PBC之前, STA发 送不带有 PBC信息的 probe request (探测请求帧) , 即此时 probe request中 的 WSC IE ( WSC全称为 Wi-Fi Simple Config ( Wi-Fi简单设置) , 等同于 WPS, IE全称为 Information Element (信息元素) ) 中不包含 PBC, 用于寻 找周围可以提供接入功能的 AP; 步骤 2、 AP收到该信息后, 使用不带有 PBC信息的 probe response (探 测响应帧) 回应;
步骤 3、 AP按下 PBC按键, 提供 PBC的 wps连接接入;
步骤 4、由于此时 STA没有按下 PBC,依旧发送不带有 PBC信息的 probe request;
步骤 5、 此时 AP回复信息同步骤 2;
步骤 6、 STA按下 PBC按键, 发送的 probe request中含有了 PBC信息, 即此时发送的 probe request中的 WSC IE中包含 PBC信息, 表示此次以 PBC 方式接入, 向 AP通告 STA已经开启 PBC操作;
步骤 7、 此时 AP的回复帧中也带有 PBC信息, 向 STA通告 AP亦提供
PBC操作;
步骤 8、 AP和 STA通过注册协议, 完成连接。
在这种连接方式下, 在步骤 6中, 如果非法用户检测到 AP提供了 PBC 服务, 在合法用户按下按键之前, 抢先发送带有 PBC信息的 probe request, 那么 AP不会做任何的校验操作, 直接根据 wps注册协议, 将非法用户接入 网络中, 而将合法用户排除在网络之外, 带来严重的安全隐患。
综上所述, 由于 WPS协议是公开协议, 兼容 wps规范的接入点会遵循 wps协议的处理流程, 只要符合 wps接入规范, 任何工作站均能成功的接入 到接入点中。 接入点无法区分通过 wps接入的工作站是合法用户还是非法用 户, 给网络完全带来极大的隐患。
发明内容
本发明的目的是提供一种接入点及无线工作站安全连接接入点的方法, 使得用户能够在利用 wps快捷方便地接入网络的同时, 又能保证无线网络的 安全。
为解决上述技术问题, 本发明提供了一种无线工作站(STA )安全连接 接入点 (AP ) 的方法, 包括:
在 WPS ( Wi-Fi保护设置 )连接过程中, AP在开启 WPS连接后开始计 时, 并且在计时时间内不进行 WPS连接, 在所述计时时间到达后, 如果所述 则终止本次 WPS连接过程。
该方法还包括: 在所述计时时间到达后, 如果所述 AP检测到所述计时 时间内只有一个 STA开启了 WPS连接, 则与该 STA完成 WPS连接。
该方法还包括: 所述 AP在终止本次 WPS连接过程的同时进行报警。 所述计时时间大于等于 30秒小于等于 60秒。
该方法还包括: 所述 AP根据接收到的 STA发出的探测请求帧中携带的 源 MAC地址, 检测所述计时时间内开启了 WPS连接的 STA的个数。
为解决上述技术问题, 本发明还提供了一种接入点 (AP ) , 包括计时模 块、 连接模块和判断模块, 其中:
所述计时模块设置成: 在 WPS ( Wi-Fi保护设置)连接过程中, 当 AP 开启 WPS连接后, 开始计时;
所述连接模块设置成: 在计时时间内不进行 WPS连接;
所述判断模块设置成: 在所述计时时间到达后, 如果检测到所述计时时 间内有两个或者有两个以上的 STA开启了 WPS连接,则终止本次 WPS连接 过程。
所述判断模块还设置成: 在所述计时时间到达后, 如果检测到所述计时 时间内只有一个 STA开启了 WPS连接, 则触发连接模块; 所述连接模块还 设置成: 在受到判断模块的触发后与 STA完成 WPS连接。
所述 AP还包括报警模块, 该报警模块设置成在所述判断模块终止本次 WPS连接过程时进行报警。
所述计时时间大于等于 30秒且小于等于 60秒。
所述判断模块还设置成根据接收到的 STA发出的探测请求帧中携带的源
MAC地址, 检测所述计时时间内开启了 WPS连接的 STA的个数。 本发明可以防止非法用户通过公开的 wps协议接入启动 wps连接过程的 接入点, 对于不具备无线安全设置知识的普通用户, 其在使用简便的 wps按 键接入网络时, 防止非法用户利用 wps公开协议同时接入, 保证了无线网络 的安全连接。 附图概述
图 1为现有技术中的 wps连接示意图;
图 2为本发明实施例的 wps连接示意图;
图 3为本发明实施例流程图。 本发明的较佳实施方式
本发明提供以下技术方案:
在 WPS连接过程中, AP在开启 WPS连接后开始计时, 并且在计时时间 内不进行 WPS连接, 在计时时间到达后, 如果 AP检测到所述计时时间内有 两个或者有两个以上的 STA (工作站)开启了 WPS连接, 则终止本次 WPS 连接过程。
在所述计时时间到达后, 如果 AP检测到所述计时时间内只有一个 STA 开启了 WPS连接, 则允许该 STA进行 WPS连接, 即与所述 STA完成 WPS 连接。
优选地, 所述 AP终止本次 WPS连接过程的同时还进行报警。
该计时时间为在 AP上预设的延时时间, 优选为大于等于 30秒且小于等 于 60秒。
在该段时间区间内, AP在收到带有 PBC信息(所述 PBC信息用于表示 此次 WPS连接以 PBC方式发起)的 probe resquest报文后依旧回复不带有 PBC 信息的 probe response才艮文。 在这种回复方式下, STA和 AP不会启动 WPS 协议进行连接, 而 AP则可以通过 probe resquest报文中携带的源 MAC (介质
STA向 AP发送了探测请求报文, 从而判别出是否存在未经允许的非法用户 提出了 wps连接请求。
在家庭网关中包含一个无线接入点, 该接入点在支持标准 wps规范的同 时, 还可实现上述方法。
用户 1在使用该接入点的时候, 安装 wps规范, 按下接入点上的 wps按 钮, 此时接入点启动了 wps连接过程, 等待用户接入。 此时, 用户 2可以按 下工作站上的 PBC按键, 在等待一段延时时间后, 接入点只检测到一个用户 进行了 wps连接, 从而判定该启动了 wps连接的工作站为合法用户, 允许该 用户进行关联。 如果有非法用户同时侦测到有接入点开启了 wps连接, 同时 按下了 PBC按键或者通过其他方式, 按照 wps标准处理流程, 开启与该接入 点的 wps连接, 发出了带有 wps信息元素的 probe request报文, 而此时, 合 法用户亦釆取 wps协议流程与接入点进行连接, 也发出了带有 wps信息元素 的 probe request连接报文, 此时接入点能够侦测到有两个工作站开启了 wps 连接, 而实际的合法用户只有一个, 因此判定此时有非法用户正在尝试连接, 从而终止 wps程序, 同时使用 LED显示对用户进行告警。
如 2所示, 具体包括如下步骤:
步骤 201、在启动 PBC之前, STA发送不带有 PBC信息的 probe request, 用于寻找周围可以提供接入功能的 AP;
步骤 202、 AP收到该信息后, 使用不带有 PBC信息的 probe response回 应;
步骤 203、 AP按下 PBC按键, 提供 wps连接接入, 同时根据设定的延 时时间开始计时;
步骤 204、如果此时 STA没有按下 PBC, 则依旧发送不带有 PBC信息的 probe request;
步骤 205、 此时 AP依旧回复不带有 PBC信息的 probe response;
步骤 206、 STA按下 PBC按键, 发送的 probe request中包含 PBC信息, 向 AP通告 STA已经开启 WPS连接;
步骤 207、 AP判断延时时间未到达, 则向 STA回复不带有 PBC信息的 probe response;
步骤 208、 AP收到其他 STA发送的 probe request, 其中包含 PBC信息; 步骤 209、 AP判断延时时间到达,记录在延时时间内收到的包含 PBC信 息的 probe request , 并从中分析得到发起 robe request报文的 STA的数量, 如果大于等于 2, 则认为有非法用户尝试连接, 结束本次 wps连接过程, 并 进行报警(例如通过 LED显示) , 判断等于 1 , 则认为没有发现有非法用户 连接, 则向该 1个 STA回复带有 PBC信息的 probe response, 执行步骤 210; 具体地, AP根据所有接收到的 probe request报文中的 MAC地址判断尝 试连接的 STA的个数。 例如有多个 probe request报文时, 如果这些报文中的 源 MAC地址都是一样的, 也说明只有一个 STA启动了 WPS连接。
步骤 210, AP和该 STA通过注册协议, 按正常流程完成 STA与 AP的 WPS连接。
对于 AP来说, 其上的流程如图 3所示, 包括:
步骤 301 , 用户按下 PBC, AP启动 wps连接;
步骤 302, 根据预先设置的计时时间开始计时;
步骤 303 , 如果收到 STA发送的包含 PBC信息的 probe request, 则回复 不带有 PBC信息的 robe response , 并记录收到的 robe request;
步骤 304,计时时间到达后根据记录的 probe request判断是否有两个或两 个以上 STA进行 wps连接, 如果是, 执行步骤 305 , 如果只有一个 STA进行 wps连接, 则执行步骤 306;
步骤 305 , 关闭 wps程序, 并告警, 结束;
步骤 306, wps接入合法用户, 结束。
实现上述方法的接入点包括计时模块、 连接模块和判断模块, 其中: 所述计时模块设置成: 在 WPS连接过程中, 当 AP开启 WPS连接后, 开始计时; 所述连接模块在计时时间内不进行 WPS连接;
所述判断模块设置成: 在所述计时时间到达后, 如果检测到所述计时时 间内有两个或者有两个以上的 STA开启了 WPS连接,则终止本次 WPS连接 过程。
优选地, 所述判断模块还设置成: 在所述计时时间到达后, 如果检测到 所述计时时间内只有一个 STA开启了 WPS连接, 则触发连接模块;
所述连接模块在受到判断模块的触发后与 STA完成 WPS连接。
优选地, 所述 AP还包括报警模块, 其设置成在所述判断模块终止本次 WPS连接过程时进行报警。
优选地, 所述判断模块根据接收到的 STA发出的探测请求帧中携带的源
MAC地址, 检测所述计时时间内开启了 WPS连接的 STA的个数。
本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序 来指令相关硬件完成, 所述程序可以存储于计算机可读存储介质中, 如只读 存储器、 磁盘或光盘等。 可选地, 上述实施例的全部或部分步骤也可以使用 一个或多个集成电路来实现。 相应地, 上述实施例中的各模块可以釆用硬件 的形式实现, 也可以釆用软件功能模块的形式实现。 本发明不限制于任何特 定形式的硬件和软件的结合。
当然, 本发明还可有其他多种实施例, 在不背离本发明精神及其实质的 但这些相应的改变和变形都应属于本发明所附的权利要求的保护范围。
工业实用性 与现有技术相比, 本发明可以防止非法用户通过公开的 wps协议接入启 动 wps连接过程的接入点, 保证了无线网络的安全连接。

Claims

权 利 要 求 书
1、 一种无线工作站(STA )安全连接接入点 (AP ) 的方法, 包括: 在 Wi-Fi保护设置 ( WPS )连接过程中, AP在开启 WPS连接后开始计 时, 并且在计时时间内不进行 WPS连接, 在所述计时时间到达后, 如果所述 则终止本次 WPS连接过程。
2、 如权利要求 1所述的方法, 还包括:
在所述计时时间到达后, 如果所述 AP检测到所述计时时间内只有一个 STA开启了 WPS连接, 则与该 STA完成 WPS连接。
3、 如权利要求 1所述的方法, 还包括:
所述 AP在终止本次 WPS连接过程的同时进行报警。
4、 如权利要求 1或 2所述的方法, 其中,
所述计时时间大于等于 30秒且小于等于 60秒。
5、 如权利要求 1或 2所述的方法, 还包括:
所述 AP根据接收到的 STA发出的探测请求帧中携带的源 MAC地址, 检测在所述计时时间内开启了 WPS连接的 STA的个数。
6、 一种接入点 (AP ) , 包括计时模块、 连接模块和判断模块, 其中: 所述计时模块设置成: 在 Wi-Fi保护设置 (WPS )连接过程中, 当所述 AP开启 WPS连接后, 开始计时;
所述连接模块设置成: 在计时时间内不进行 WPS连接;
所述判断模块设置成: 在所述计时时间到达后, 如果检测到所述计时时 间内有两个或者有两个以上的无线工作站(STA )开启了 WPS连接, 则终止 本次 WPS连接过程。
7、 如权利要求 6所述的接入点, 其中,
所述判断模块还设置成: 在所述计时时间到达后, 如果检测到所述计时 时间内只有一个 STA开启了 WPS连接, 则触发连接模块; 所述连接模块还设置成: 受到所述判断模块的触发后与 STA完成 WPS 连接。
8、 如权利要求 6所述的接入点, 还包括报警模块, 所述报警模块设置成 在所述判断模块终止本次 WPS连接过程时进行报警。
9、 如权利要求 6或 7所述的接入点, 其中,
所述计时时间大于等于 30秒且小于等于 60秒。
10、 如权利要求 6或 7所述的接入点, 其中,
所述判断模块还设置成: 根据接收到的 STA发出的探测请求帧中携带的 源 MAC地址, 检测所述计时时间内开启了 WPS连接的 STA的个数。
PCT/CN2011/075170 2010-10-19 2011-06-02 一种接入点及无线工作站安全连接接入点的方法 WO2012051858A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010511475.9 2010-10-19
CN201010511475.9A CN102457850B (zh) 2010-10-19 2010-10-19 一种接入点及无线工作站安全连接接入点的方法

Publications (1)

Publication Number Publication Date
WO2012051858A1 true WO2012051858A1 (zh) 2012-04-26

Family

ID=45974660

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/075170 WO2012051858A1 (zh) 2010-10-19 2011-06-02 一种接入点及无线工作站安全连接接入点的方法

Country Status (2)

Country Link
CN (1) CN102457850B (zh)
WO (1) WO2012051858A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104394178A (zh) * 2014-12-18 2015-03-04 上海市共进通信技术有限公司 实现无线局域网快速访问控制的系统及方法

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297952B (zh) * 2013-05-10 2016-05-04 深圳市共进电子股份有限公司 一种双频wps触发方法
CN104378836A (zh) * 2013-08-14 2015-02-25 中兴通讯股份有限公司 一种建立便捷无线连接的方法及装置
CN104105218B (zh) * 2014-07-25 2017-12-12 Tcl通讯(宁波)有限公司 Android系统手机热点WPS连接实现方法及系统
CN105188058A (zh) * 2015-09-25 2015-12-23 上海矽昌通信技术有限公司 一种wifi扫描阶段进行身份识别的认证方法
CN107734717B (zh) * 2017-09-15 2020-10-27 深圳市共进电子股份有限公司 无线中继设备的wps连接方法、装置、设备及存储介质
CN114302386B (zh) * 2021-12-24 2023-06-09 深圳创维数字技术有限公司 无线网络连接方法、装置、接入点以及存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1169813A (zh) * 1994-11-10 1998-01-07 Lm爱立信电话有限公司 无线通信网络中的盗用检测
CN101605329A (zh) * 2009-06-30 2009-12-16 中兴通讯股份有限公司 接入方法和接入装置
CN101621804A (zh) * 2009-08-04 2010-01-06 中兴通讯股份有限公司 安全无线接入方法和装置

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8032174B2 (en) * 2006-07-07 2011-10-04 Research In Motion Limited Provisioning methods and apparatus for wireless local area networks (WLANS) with use of a provisioning ESSID

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1169813A (zh) * 1994-11-10 1998-01-07 Lm爱立信电话有限公司 无线通信网络中的盗用检测
CN101605329A (zh) * 2009-06-30 2009-12-16 中兴通讯股份有限公司 接入方法和接入装置
CN101621804A (zh) * 2009-08-04 2010-01-06 中兴通讯股份有限公司 安全无线接入方法和装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104394178A (zh) * 2014-12-18 2015-03-04 上海市共进通信技术有限公司 实现无线局域网快速访问控制的系统及方法

Also Published As

Publication number Publication date
CN102457850B (zh) 2016-02-10
CN102457850A (zh) 2012-05-16

Similar Documents

Publication Publication Date Title
WO2012051858A1 (zh) 一种接入点及无线工作站安全连接接入点的方法
CN103607712B (zh) 无线网络的接入方法和装置
US7650411B2 (en) Method and system for secure management and communication utilizing configuration network setup in a WLAN
WO2014114099A1 (zh) 无线局域网防范非法接入点的方法及系统
US7710933B1 (en) Method and system for classification of wireless devices in local area computer networks
WO2018090830A1 (zh) 一种智能终端设备接入互联网的方法及装置
WO2015074367A1 (zh) 一种检测非法无线接入点的方法、装置及系统
JP2011521510A5 (zh)
Mustafa et al. Cetad: Detecting evil twin access point attacks in wireless hotspots
TW201225583A (en) Peer-to-peer communication in ad HOC wireless network
JP2008506284A5 (zh)
CN105119776B (zh) 一种WiFi连接失败原因检测方法及系统
CN103959832B (zh) 用于运行按钮配置会话的方法和设备
US10382271B2 (en) Method and network node device for controlling the run of technology specific push-button configuration sessions within a heterogeneous or homogeneous wireless network and heterogeneous or homogeneous wireless network
CN104883361A (zh) 一种无线接入客户端认证管理方法及无线网关
JP6476523B2 (ja) 無線アクセスポイント
EP2817992A1 (en) Method and network node device for controlling the run of technology specific push-button configuration sessions within a heterogeneous or homogeneous wireless network and heterogeneous or homogeneous wireless network
WO2013117131A1 (zh) 一种无线接入认证的方法及装置
WO2013185709A1 (zh) 一种呼叫认证方法、设备和系统
CN105245695B (zh) 一种提高微信AirKiss兼容性的方法及系统
CN106685843B (zh) 一种安全强化路由器的方法
WO2015196679A1 (zh) 无线接入的鉴权方法及装置
CN109327465A (zh) 一种安全抵御网络劫持的方法
CN111405548B (zh) 一种钓鱼wifi的检测方法及装置
WO2016062017A1 (zh) 一种无线网络连接方法、装置和计算机存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11833764

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11833764

Country of ref document: EP

Kind code of ref document: A1