WO2018036221A1 - 一种无线网络安全认证装置及其方法、一种路由器 - Google Patents

一种无线网络安全认证装置及其方法、一种路由器 Download PDF

Info

Publication number
WO2018036221A1
WO2018036221A1 PCT/CN2017/085110 CN2017085110W WO2018036221A1 WO 2018036221 A1 WO2018036221 A1 WO 2018036221A1 CN 2017085110 W CN2017085110 W CN 2017085110W WO 2018036221 A1 WO2018036221 A1 WO 2018036221A1
Authority
WO
WIPO (PCT)
Prior art keywords
wireless network
client
authentication
name
module
Prior art date
Application number
PCT/CN2017/085110
Other languages
English (en)
French (fr)
Inventor
李蕾蕾
Original Assignee
上海斐讯数据通信技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海斐讯数据通信技术有限公司 filed Critical 上海斐讯数据通信技术有限公司
Publication of WO2018036221A1 publication Critical patent/WO2018036221A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/16Gateway arrangements

Definitions

  • the present invention relates to the field of network security technologies, and in particular, to a wireless network security authentication apparatus and method thereof, and a router.
  • the wireless function of the router is to forward the broadband network signal it receives to the nearby wireless network device (for example, a wireless device with WIFI (Wireless-Fidelity) function) such as a laptop or a smart phone.
  • the wireless network device performs authentication by inputting the current name of the corresponding wireless network, that is, the wireless password of the Service Set Identifier (SSID). After the authentication succeeds, the router can be connected to the router. If the right fails, you cannot connect to the router to access the network.
  • SSID Service Set Identifier
  • the wireless connection function undoubtedly makes the mobility of network users more powerful and the use of the network more convenient, but also provides some unscrupulous users with a way to connect to the network, that is, obtain wireless passwords through brute force cracking (using different software through cracking software)
  • the password is connected to the SSID of another network at a high rate to crack the wireless password of the network. It also brings convenience to these unscrupulous users to use other people's networks.
  • the present invention provides a wireless network security authentication apparatus and method thereof, and a router, which has a network user who shields a wireless password by using a brute force attack method and a network user who is manually connected, thereby improving wireless Network security performance.
  • a wireless network security authentication device includes: a client authentication module and a network name modification module, wherein
  • the client authentication module authenticates a wireless network connection of the client based on a preset authentication rule
  • the network name modification module is connected to the client authentication module, and the network name modification module modifies the current name of the wireless network based on the authentication result of the client authentication module.
  • the client attempting to connect to the wireless network is authenticated by the client authentication module, and after the client authentication fails, the current name of the wireless network is modified by the network name modification module to improve the wireless network.
  • the security level so that the client cannot search for the original wireless network name and cannot connect to the wireless network.
  • the preset authentication rule includes: a method in which a client connects to a wireless network Weight failure frequency threshold;
  • the client authentication module determines, according to the preset authentication rule, whether the wireless network connection of the client is successfully authenticated.
  • the client authentication wireless network reaches the authentication failure frequency threshold, the client authentication fails, and the network name modification module modifies the current name of the wireless network, and after the modification Broadcast. Conversely, if the final authentication succeeds after a limited number of authentications (the frequency of the current name of the authentication wireless network is less than the authentication failure frequency threshold) is performed within the specified time, the client still successfully authenticates and successfully connects to the client. The wireless network, at this time, the network name modification module will not modify the current name of the wireless network. In this way, the possibility of smashing the network is eliminated in the first time, and once the network user is available, the current name of the wireless network is modified.
  • the wireless network security authentication device further includes a storage module respectively connected to the client authentication module and the network name modification module;
  • a pre-stored preset authentication rule and a preset name modification rule are pre-stored in the storage module, and the network name modification module modifies a current name of the wireless network based on the preset name modification rule;
  • the preset name modification rule includes: modifying the wireless network based on the current name of the wireless network, including randomly adding a string suffix in the current name of the wireless network.
  • the network name modification module modifies the current name of the wireless network according to the preset name modification rule, so that the user can find the wireless network by itself, which is simple and convenient.
  • the wireless network security authentication device further includes a client identity authentication module connected to the client authentication module;
  • the client identity authentication module determines whether the identity of the client is legal based on the identity information that uniquely identifies the client;
  • the client authentication module authenticates the wireless network connection of the client based on the authentication result of the client identity authentication module and the preset authentication rule.
  • the client when the client starts to connect to the wireless network, the client first authenticates the identity of the client through the client identity authentication module, and determines whether the client is legal. If the user is legitimate, the username is authenticated using the name of the wireless network when the client is authorized to connect. In this way, even if the name of the wireless network is modified, the connection of the corresponding client is not affected, and there is no need to manually manage each client.
  • the identification information that uniquely identifies the client is a physical address of the client
  • the client identity authentication module determines whether the identity of the client is legal by comparing the physical address of the client with the physical address list in the pre-existing storage module.
  • the physical address list includes: when the authorized client connects to the wireless network. The relationship between the name of the wireless network and the physical address of the client;
  • the client authentication module determines whether to use the current name of the wireless network to authenticate the wireless network connection of the client based on the authentication result of the client identity authentication module and the preset authentication rule.
  • the physical address of the legal client is stored, and the client in the physical address list is authenticated by using the associated wireless network name, thereby effectively preventing the use of the random wireless physical address client.
  • the present invention also provides a router including the above-described wireless network security authentication apparatus.
  • the invention also provides a wireless network security authentication method, comprising:
  • S1 authenticates the wireless network connection of the client based on the preset authentication rule
  • step S2 modifies the current name of the wireless network based on the authentication result in step S1.
  • the client attempting to connect to the wireless network is first authenticated, and after the client authentication fails, the current name of the wireless network is modified, so that the client cannot search for the original wireless network name. Unable to connect to the wireless network.
  • the step S1 includes: determining, according to the preset authentication rule, whether the wireless network connection of the client is successfully authenticated; the preset authentication rule includes: the authentication failure of the client in the process of connecting to the wireless network Frequency threshold; and/or,
  • the step S2 specifically includes: if the wireless network connection authentication of the client fails in the step S1, modifying the current name of the wireless network according to the preset name modification rule; the preset name modification rule includes: the current based on the wireless network The name is modified to include a string suffix randomly added to the current name of the wireless network.
  • the frequency of the current name of the client authentication wireless network reaches the authentication loss If the frequency threshold is lost, the client authentication fails, the current name of the wireless network is modified, and the broadcast is performed after the modification. Conversely, if the final authentication succeeds after a limited number of authentications (the frequency of the current name of the authentication wireless network is less than the authentication failure frequency threshold) is performed within the specified time, the client still successfully authenticates and successfully connects to the client.
  • the wireless network will not modify the current name of the wireless network at this time. In this way, the possibility of smashing the network is eliminated in the first time, and once the network user is available, the current name of the wireless network is modified.
  • the method further includes: S0 determining, according to the identifier information of the unique identifier client, whether the identity of the client is legal;
  • the step S1 includes: authenticating the wireless network connection of the client based on the authentication result and the preset authentication rule in step S0.
  • the client when the client starts to connect to the wireless network, the client first authenticates the identity of the client, and determines whether the client is legal. If the user is legitimate, the username is authenticated using the name of the wireless network when the client is authorized to connect. In this way, even if the name of the wireless network is modified, the connection of the corresponding client is not affected, and there is no need to manually manage each client.
  • the method further comprises: comparing, by comparing the physical address of the client with the pre-stored physical address list, whether the identity of the client is legal; the physical address list includes: when the authorized client connects to the wireless network The relationship between the name of the wireless network and the physical address of the client;
  • step S1 it is determined whether to authenticate the wireless network connection of the client by using the current name of the wireless network based on the authentication result and the preset authentication rule in step S0.
  • the physical address of the legal client is stored, and the client in the physical address list is authenticated by using the associated wireless network name, thereby effectively preventing the use of the random wireless physical address client.
  • the wireless network security authentication apparatus, method, and router provided by the present invention, there is no need to increase hardware cost, and the portability is strong, and is applicable to any wireless device that needs a flood prevention network. As long as the corresponding wireless device is powered on and the wireless network security authentication function is activated, the flood prevention network mechanism will take effect, and the security performance of the wireless network can be improved simply and effectively.
  • FIG. 1 is a schematic diagram of an embodiment of a wireless network security authentication apparatus according to the present invention.
  • FIG. 2 is a schematic diagram of another embodiment of a wireless network security authentication apparatus according to the present invention.
  • FIG. 3 is a schematic diagram of another embodiment of a wireless network security authentication apparatus according to the present invention.
  • FIG. 4 is a schematic diagram of an embodiment of a wireless network security authentication method according to the present invention.
  • FIG. 5 is a schematic diagram of another embodiment of a wireless network security authentication method according to the present invention.
  • 100-Wireless network security authentication device 110-client authentication module, 120-network name modification module, 130-storage module, 140-client identity authentication module.
  • FIG. 1 is a schematic diagram of an embodiment of a wireless network security authentication apparatus provided by the present invention.
  • the wireless network security authentication apparatus 100 includes: an interconnected client authentication module 110 and Network name modification module 120.
  • the client authentication module 110 authenticates the wireless network connection of the client based on the preset authentication rule; the network name modification module 120 performs the current name of the wireless network based on the authentication result of the client authentication module 110. modify.
  • the network name modification module 120 modifies the current name of the wireless network, and performs the modified wireless network name. Broadcast, otherwise the client is connected to the wireless network and still broadcasts the current name of the wireless network.
  • the foregoing preset authentication rule includes: an authentication failure frequency threshold in a process in which the client connects to the wireless network.
  • the client authentication module 110 determines whether the wireless network connection of the client is successfully authenticated based on the preset authentication rule.
  • the authentication failure frequency threshold is set to 1 point. Zhong Jianquan 4 times, in this way, when a client enters 4 authentication passwords within 1 minute based on the current name of the wireless network and all authentication fails, the client authentication fails, and the network name modification module 120 is notified to modify the current wireless network.
  • the name prevents the client from smashing the network (eg, manually moded).
  • the authentication failure frequency threshold is set to 1 minute authentication 30 times, such that when a client enters 30 authentication passwords within 1 minute based on the current name of the wireless network and all authentication fails, Then, the client authentication fails, and the network name modification module 120 is notified to modify the current name of the wireless network to prevent the network of the client (for example, the brute force method).
  • the authentication failure frequency threshold may be set according to actual conditions, for example, it may be set to 10 times for 1 minute authentication, 20 times for 1 minute authentication, 40 times for one minute authentication, or even more. Both are included in the content of the present embodiment.
  • the wireless network security authentication apparatus 100 further includes a storage connected to the client authentication module 110 and the network name modification module 120, respectively.
  • the storage module 130 prestores a preset authentication rule and a preset name modification rule
  • the network name modification module 120 modifies the current name of the wireless network based on the preset name modification rule.
  • the preset name modification rule includes: modifying the wireless network based on its current name, including randomly adding a string suffix in the current name of the wireless network.
  • the modified name is PHICOMM123.
  • the modified name is QWERTYU, and so on. It should be noted that, in this embodiment, we do not specifically limit the modification of the current name of the wireless network, and may randomly add a string suffix, or may add a string prefix randomly, or even at any position of the current name. Randomly adding a character string, adding a preset character string to the current name of the wireless network, and the like are included in the content of the present embodiment as long as they are agreed in advance.
  • the wireless network security authentication apparatus 100 further includes a client identity authentication module 140 connected to the client authentication module 110; In the process, first, the client identity authentication module 140 determines whether the identity of the client is legal based on the identity information of the client that is uniquely identified. After that, the client authentication module 110 is based on the authentication result and the preset authentication of the client identity authentication module 140. Rules for the client's wireless network The connection is authenticated. Finally, the network name modification module 120 modifies the current name of the wireless network based on the authentication result of the client authentication module 110.
  • the identification information that uniquely identifies the client is the physical address of the client, that is, the MAC address of the wireless network card.
  • a physical address list (a physical address of a legitimate client) is stored in the storage module 130. Specifically, the physical address list includes: an association relationship between the name of the wireless network when the client connects to the wireless network and the physical address of the client.
  • the client identity authentication module 140 first obtains the physical address of the client, and then compares it with the physical address list. If the physical address of the current client is matched in the physical address list, the client is a legitimate user. The client authentication module 110 then authenticates the wireless network name stored in association with the client's physical address.
  • the client authentication module 110 authenticates the client based on the current name of the wireless network. Specifically, if the client satisfies the preset authentication rule, that is, the authentication succeeds within a limited number of times within a specified time, for example, the third authentication succeeds within 1 minute (the authentication failure frequency threshold is 1 minute authentication 4 times), Then, the client is successfully authenticated, and the physical address of the client is added to the physical address list to form a new physical address list. If the client does not satisfy the preset authentication rule, the network name modification module 120 modifies the current name of the wireless network according to the preset name modification rule.
  • the client authentication module 110 authenticates the physical address in the physical address list according to the wireless network name associated with the physical address list by using the determining function, that is, for the first client, the current name of the wireless network is removed. Randomly added characters are authenticated using the wireless network name PHICOMM; for the second client, the wireless network name PHICOMMA is used to authenticate them.
  • the present invention also provides a router including the above-described wireless network security authentication apparatus 100.
  • the router by adding the wireless network security authentication device 100, the security performance of the wireless network is greatly improved, and the user is prevented from smashing the network.
  • FIG. 4 is a flowchart of an implementation manner of a wireless network security authentication method according to the present invention.
  • the wireless network security authentication method includes: S1 authenticating a wireless network connection of the client based on a preset authentication rule; S2 is based on the authentication result in step S1 on the current wireless network. The name is modified.
  • the step S1 includes: determining, according to the preset authentication rule, whether the wireless network connection of the client is successfully authenticated; the preset authentication rule includes: an authentication failure frequency threshold in the process of connecting the wireless network to the client.
  • the authentication failure frequency threshold is set to 1 minute authentication 10 times, so that when a client enters 10 authentication passwords within 1 minute based on the current name of the wireless network and all authentication fails, then If the client fails to authenticate, the process proceeds to step S2 to modify the current name of the wireless network, and the modified wireless network name is broadcasted to prevent the client from being manually connected.
  • the client authentication succeeds. , the current name of the wireless network is not modified, and the current name of the wireless network is still broadcast.
  • step S2 if the authentication of the wireless network connection of the client fails in step S1, the current name of the wireless network is modified based on the preset name modification rule; the preset name modification rule includes: the current name pair based on the wireless network. It is modified to include a random string suffix in the current name of the wireless network. In one embodiment, if the current name of the wireless network is PHICOMM, the modified name is PHICOMM 123, and so on.
  • FIG. 2 is a schematic flowchart diagram of another implementation manner of a wireless network security authentication method according to the present invention.
  • the wireless network security authentication method includes: S0 Determining whether the identity of the client is legal based on the identifier information of the unique identifier client; S1 authenticating the wireless network connection of the client based on the authentication result and the preset authentication rule in step S0; S2 is based on the authentication result in step S1.
  • the current name of the network is modified.
  • the step S0 includes: comparing the physical address of the client with the pre-stored physical address list to determine whether the identity of the client is legal; the step S1 specifically includes: based on the authentication result and the preset authentication in step S0.
  • the rule determines whether the client's wireless network connection is authenticated using the current name of the wireless network.
  • the identifier information that uniquely identifies the client is the physical address of the client, that is, none.
  • the physical address list includes: an association relationship between the name of the wireless network when the client is connected to the wireless network and the physical address of the client. Based on this, in step S0, the physical address of the client is first obtained, and then compared with the physical address list. If the physical address of the current client is matched in the physical address list, the client is a legitimate user. It is then authenticated based on the name of the wireless network stored in association with the physical address of the client. Conversely, if the physical address of the current client cannot be matched in the physical address list, the client is authenticated based on the current name of the wireless network.
  • the client satisfies the preset authentication rule, that is, the authentication succeeds within a limited number of times within a specified time, for example, the 10th authentication succeeds within 1 minute (the authentication failure frequency threshold is 30 minutes for 1 minute authentication), Then, the client is successfully authenticated, and the physical address of the client is added to the physical address list to form a new physical address list. If the client does not satisfy the preset authentication rule, the current name of the wireless network is modified according to the preset name modification rule in step S2.
  • the client authentication module 110 authenticates the physical address in the physical address list according to the wireless network name associated with the physical address list by using the determining function, that is, for the first client, the current name of the wireless network is removed. Randomly added characters are authenticated using the wireless network name PHICOMM; for the second client, the wireless network name PHICOMMA is used to authenticate them.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明提供了一种无线网络安全认证装置及其方法、一种路由器,其中,在该无线网络安全认证装置中包括:客户端鉴权模块以及网络名称修改模块,其中,客户端鉴权模块,基于预设鉴权规则对客户端的无线网络连接进行鉴权;网络名称修改模块,与客户端鉴权模块连接,网络名称修改模块基于客户端鉴权模块的鉴权结果对无线网络的当前名称进行修改。其通过这种方式反复修改无线网络的名称,不仅使得采用暴力破解方式蹭网的用户无法完成暴力破解;同时,使得采用手动方式蹭网的用户也变得不可能,大大提高了无线网络安全性能。

Description

一种无线网络安全认证装置及其方法、一种路由器 技术领域
本发明涉及网络安全技术领域,尤其涉及一种无线网络安全认证装置及其方法、一种路由器。
背景技术
路由器的无线功能是将其接出的宽带网络信号通过天线转发给附近的无线网络设备(如,笔记本电脑、智能手机等带有WIFI(Wireless-Fidelity,无线保真)功能的电子设备)。无线网络设备在连接无线网络的过程中,通过输入相应无线网络的当前名称,即SSID(Service Set Identifier,服务集标识)的无线密码进行鉴权,鉴权成功后即可以连接到该路由器,鉴权失败就无法连接到路由器访问网路。无线连接功能无疑使得网络用户的移动性增强、网络的使用更方便,但是也给某些无良用户提供了连接网路的途径,即通过暴力破解的方式获取无线密码(通过破解软件使用不同的密码高速率地连接他人的SSID来破解该网络的无线密码),同样也为这些无良用户蹭用他人的网络带来了便利。
针对这一问题,现有的提高无线认证安全的方式大致分为以下几种:
1)通过加强路由器本身的安全性能,如通过隐藏无线SSID、禁用DHCP(Dynamic Host Configuration Protocol,动态主机配置协议)服务器等,对于这种方式来说,可信用户加入网络来说比较麻烦,如家里有客人来访时,如若需要使用无线网络就得手动输入SSID,反而给用户带来了一定程度上的麻烦;
2)通过禁用WPS(WiFi Protected Setup,WiFi保护设置)功能、更改路由器登陆的用户名或密码等,对于这种方式来说,仍然无法有效地阻止无线密码被暴力破解;
3)通过添加无线MAC(Media Access Control,物理地址)过滤规则、设置SSID密码位数较长等,对于这种方式来说,若暴力破解用户使用随机MAC地址认证无线网络,就无法有效的防止无线密码的暴力破解;
4)通过在电脑上安装防蹭网软件,利用防ARP(Address Resolution Protocol,地址解析协议)攻击、欺骗等机制实现,对于这种方式来说,可能导致用户无法上网,而且只有在电脑开机时防蹭网才会生效,无法做到实时防蹭网;
5)通过在路由器上增加硬件防火墙和WiFi信号接收发射器,其通过硬件防火墙绑定本机或允许通过访问的用户,其他用户则拒绝访问的实现方式,对于这种方式来说,无疑增加了硬件成本。
可以看出,现有的这些提高无线认证安全的方式都不能很好的解决防蹭网问题。
发明内容
针对上述问题,本发明提供了一种无线网络安全认证装置及其方法、一种路由器,有屏蔽了使用暴力破解方式获取无线密码的蹭网用户和通过手动方式连接的蹭网用户,提高了无线网络的安全性能。
本发明提供的技术方案如下:
一种无线网络安全认证装置,包括:客户端鉴权模块以及网络名称修改模块,其中,
所述客户端鉴权模块,基于预设鉴权规则对客户端的无线网络连接进行鉴权;
所述网络名称修改模块,与所述客户端鉴权模块连接,所述网络名称修改模块基于所述客户端鉴权模块的鉴权结果对无线网络的当前名称进行修改。
在本技术方案中,通过客户端鉴权模块对试图连接无线网络的客户端进行鉴权,且在客户端鉴权失败之后,通过网络名称修改模块对无线网络的当前名称进行修改,提高无线网络的安全等级,这样,客户端就无法搜索到原有无线网络名称从而无法连接到该无线网络。通过这种方式反复修改无线网络的名称,不仅使得采用暴力破解方式蹭网的用户无法完成暴力破解;同时,使得采用手动方式蹭网的用户也变得不可能,大大提高了无线网络安全性能。
进一步优选地,所述预设鉴权规则包括:客户端连接无线网络过程中的鉴 权失败频率阈值;
所述客户端鉴权模块基于所述预设鉴权规则判断客户端的无线网络连接是否鉴权成功。
在本技术方案中,若客户端鉴权无线网络的当前名称的频率到达了鉴权失败频率阈值,则客户端鉴权失败,网络名称修改模块对无线网络的当前名称进行修改,并在修改之后进行广播。相反地,若在规定时间内进行了有限次的鉴权(鉴权无线网络的当前名称的频率小于鉴权失败频率阈值)之后最终鉴权成功,则该客户端仍然鉴权成功,成功连接到该无线网络,此时网络名称修改模块将不对无线网络的当前名称进行修改。以此在第一时间杜绝蹭网的可能,一旦有蹭网用户,就对无线网络的当前名称进行修改。
进一步优选地,所述无线网络安全认证装置中还包括一分别与所述客户端鉴权模块和网络名称修改模块连接的存储模块;
所述存储模块中预存有预设鉴权规则和预设名称修改规则,所述网络名称修改模块基于所述预设名称修改规则对无线网络的当前名称进行修改;
所述预设名称修改规则中包括:基于无线网络的当前名称对其进行修改,包括在无线网络的当前名称中随机添加字符串后缀。
在本技术方案中,网络名称修改模块根据预设名称修改规则对无线网络的当前名称进行修改,以此方便用户自己能够找到该无线网络,简单方便。
进一步优选地,所述无线网络安全认证装置中还包括与所述客户端鉴权模块连接的客户端身份认证模块;
所述客户端身份认证模块基于唯一标识客户端的标识信息判定该客户端的身份是否合法;
所述客户端鉴权模块基于所述客户端身份认证模块的认证结果和预设鉴权规则对客户端的无线网络连接进行鉴权。
在本技术方案中,客户端在开始连接无线网络时,首先通过客户端身份认证模块对客户端的身份进行认证,判断该客户端是否合法。若该用户合法,则使用授权该客户端连接时无线网络的名称对其进行鉴权。这样,后续即便修改无线网络的名称,也不影响相应客户端的连接,无需手动对各客户端进行管理。
进一步优选地,所述唯一标识客户端的标识信息为客户端的物理地址;
所述客户端身份认证模块通过将客户端的物理地址与预存在存储模块中的物理地址列表进行比对判断该客户端的身份是否合法;所述物理地址列表中包括:授权客户端连接无线网络时的无线网络名称与该客户端物理地址的关联关系;
所述客户端鉴权模块基于所述客户端身份认证模块的认证结果和预设鉴权规则判断是否使用无线网络的当前名称对客户端的无线网络连接进行鉴权。
在本技术方案中,通过对合法客户端的物理地址进行存储,且对物理地址列表中的客户端采用与其关联的无线网络名称进行鉴权,有效防止了使用随机无线物理地址客户端的蹭网。
本发明还提供了一种路由器,该路由器中包括上述的无线网络安全认证装置。
本发明还提供了一种无线网络安全认证方法,包括:
S1基于预设鉴权规则对客户端的无线网络连接进行鉴权;
S2基于步骤S1中的鉴权结果对无线网络的当前名称进行修改。
在本技术方案中,首先对试图连接无线网络的客户端进行鉴权,在客户端鉴权失败之后,对无线网络的当前名称进行修改,这样,客户端就无法搜索到原有无线网络名称从而无法连接到该无线网络。通过这种方式反复修改无线网络的名称,不仅使得采用暴力破解方式蹭网的用户无法完成暴力破解;同时,使得采用手动方式蹭网的用户也变得不可能,大大提高了无线网络安全性能。
进一步优选地,在步骤S1中具体包括:基于所述预设鉴权规则判断客户端的无线网络连接是否鉴权成功;所述预设鉴权规则包括:客户端连接无线网络过程中的鉴权失败频率阈值;和/或,
在步骤S2中具体包括:若步骤S1中客户端的无线网络连接鉴权失败,基于预设名称修改规则对无线网络的当前名称进行修改;所述预设名称修改规则中包括:基于无线网络的当前名称对其进行修改,包括在无线网络的当前名称中随机添加字符串后缀。
在本技术方案中,若客户端鉴权无线网络的当前名称的频率到达了鉴权失 败频率阈值,则客户端鉴权失败,对无线网络的当前名称进行修改,并在修改之后进行广播。相反地,若在规定时间内进行了有限次的鉴权(鉴权无线网络的当前名称的频率小于鉴权失败频率阈值)之后最终鉴权成功,则该客户端仍然鉴权成功,成功连接到该无线网络,此时将不对无线网络的当前名称进行修改。以此在第一时间杜绝蹭网的可能,一旦有蹭网用户,就对无线网络的当前名称进行修改。
进一步优选地,在步骤S1之前还包括:S0基于唯一标识客户端的标识信息判定该客户端的身份是否合法;
在步骤S1中具体包括:基于步骤S0中的认证结果和预设鉴权规则对客户端的无线网络连接进行鉴权。
在本技术方案中,客户端在开始连接无线网络时,首先对客户端的身份进行认证,判断该客户端是否合法。若该用户合法,则使用授权该客户端连接时无线网络的名称对其进行鉴权。这样,后续即便修改无线网络的名称,也不影响相应客户端的连接,无需手动对各客户端进行管理。
进一步优选地,在步骤S0中具体包括:通过将客户端的物理地址与预存的物理地址列表进行比对判断该客户端的身份是否合法;所述物理地址列表中包括:授权客户端连接无线网络时的无线网络名称与该客户端物理地址的关联关系;
在步骤S1中具体包括:基于步骤S0中的认证结果和预设鉴权规则判断是否使用无线网络的当前名称对客户端的无线网络连接进行鉴权。
在本技术方案中,通过对合法客户端的物理地址进行存储,且对物理地址列表中的客户端采用与其关联的无线网络名称进行鉴权,有效防止了使用随机无线物理地址客户端的蹭网。
另外,在本发明提供的无线网络安全认证装置、方法及路由器中,无需增加硬件成本,可移植性强,适用于任何需要防蹭网的无线设备。只要相应的无线设备开机并启动了无线网络安全认证功能,防蹭网机制就会生效,简单有效地提高了无线网络的安全性能。
附图说明
下面将以明确易懂的方式,结合附图说明优选实施方式,对上述特性、技术特征、优点及其实现方式予以进一步说明。
图1为本发明中无线网络安全认证装置一种实施方式的示意图;
图2为本发明中无线网络安全认证装置另一种实施方式的示意图;
图3为本发明中无线网络安全认证装置另一种实施方式的示意图;
图4为本发明中无线网络安全认证方法一种实施方式的示意图;
图5为本发明中无线网络安全认证方法另一种实施方式的示意图。
附图标号说明:
100-无线网络安全认证装置,110-客户端鉴权模块,120-网络名称修改模块,130-存储模块,140-客户端身份认证模块。
具体实施方式
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对照附图说明本发明的具体实施方式。显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图,并获得其他的实施方式。
如图1所示为本发明提供的无线网络安全认证装置一种实施方式的示意图,从图中可以看出,在该无线网络安全认证装置100中包括:相互连接的客户端鉴权模块110和网络名称修改模块120。在工作过程中,客户端鉴权模块110基于预设鉴权规则对客户端的无线网络连接进行鉴权;网络名称修改模块120基于客户端鉴权模块110的鉴权结果对无线网络的当前名称进行修改。具体来说,在此过程中,若客户端鉴权模块110对客户端的无线网络连接鉴权失败,则网络名称修改模块120对无线网络的当前名称进行修改,并将修改后无线网络的名称进行广播,否则放行该客户端连接无线网络,仍然广播无线网络的当前名称。
具体来说,在上述预设鉴权规则中包括:客户端连接无线网络过程中的鉴权失败频率阈值。客户端鉴权模块110基于预设鉴权规则判断客户端的无线网络连接是否鉴权成功。在一个具体实施例中,将鉴权失败频率阈值设置为1分 钟鉴权4次,这样,当某一客户端基于无线网络的当前名称在1分钟内输入4次认证密码且都认证失败,则该客户端鉴权失败,通知网络名称修改模块120修改无线网络的当前名称,防止该客户端的蹭网(如,手动方式蹭网)。在另一个具体实施例中,将鉴权失败频率阈值设置为1分钟鉴权30次,这样,当某一客户端基于无线网络的当前名称在1分钟内输入30次认证密码且都认证失败,则该客户端鉴权失败,通知网络名称修改模块120修改无线网络的当前名称,防止该客户端的蹭网(如,暴力破解方式蹭网)。在其他实施例中,可以根据实际情况对鉴权失败频率阈值进行设定,如还可以设定为1分钟鉴权10次、1分钟鉴权20次、一分钟鉴权40次甚至更多,都包括在本实施方式的内容中。
对上述实施方式进行改进得到本实施方式,如图2所示,在本实施方式中,无线网络安全认证装置100中还包括一分别与客户端鉴权模块110和网络名称修改模块120连接的存储模块130。该存储模块130中预存有预设鉴权规则和预设名称修改规则,网络名称修改模块120基于预设名称修改规则对无线网络的当前名称进行修改。更具体来说,预设名称修改规则中包括:基于无线网络的当前名称对其进行修改,包括在无线网络的当前名称中随机添加字符串后缀。在一个具体实施例中,假若无线网络的当前名称为PHICOMM,则修改后的名称为PHICOMM123。在另一个具体实施例中,假若无线网络的当前名称为QWERT,则修改后的名称为QWERTYU,以此类推。要说明的是,在本实施方式中,我们对无线网络的当前名字的修改不做具体限定,可以随机添加字符串后缀,也可以为随机添加字符串前缀,甚至可以在当前名称的任意一位置随机添加字符串、在无线网络的当前名字中添加预设字符串等,只要预先约定好,都包括在本实施方式的内容中。
对上述实施方式进行改进得到本实施方式,如图3所示,在本实施方式中,无线网络安全认证装置100中还包括与客户端鉴权模块110连接的客户端身份认证模块140;在工作过程中,首先,该客户端身份认证模块140基于唯一标识客户端的标识信息判定该客户端的身份是否合法;之后,客户端鉴权模块110基于客户端身份认证模块140的认证结果和预设鉴权规则对客户端的无线网络 连接进行鉴权;最后,网络名称修改模块120基于客户端鉴权模块110的鉴权结果对无线网络的当前名称进行修改。
更具体来说,上述唯一标识客户端的标识信息为客户端的物理地址,即无线网卡的MAC地址。在存储模块130中于存有物理地址列表(合法客户端的物理地址),具体在该物理地址列表中包括:授权客户端连接无线网络时的无线网络名称与该客户端物理地址的关联关系。基于此,客户端身份认证模块140首先获取客户端的物理地址,之后将其与物理地址列表进行比对,若能够在物理地址列表中匹配到当前客户端的物理地址,则说明该客户端为合法用户,之后客户端鉴权模块110以与该客户端的物理地址关联存储的无线网络名称对其进行鉴权。相反地,若不能在物理地址列表中匹配到当前客户端的物理地址,则客户端鉴权模块110基于无线网络的当前名称对该客户端进行鉴权。具体,若该客户端满足预设鉴权规则,即在规定时间内有限次数内鉴权成功,如1分钟内第3次鉴权成功(鉴权失败频率阈值为1分钟鉴权4次),则该客户端鉴权成功,将该客户端的物理地址添加到物理地址列表中形成新的物理地址列表。若该客户端不满足预设鉴权规则,则网络名称修改模块120按照预设名称修改规则对无线网络的当前名称进行修改。
要说明的是,在本实施方式中,若无线网络的当前名称为PHICOMM789,假若物理地址列表中包括2个客户端的物理地址,具体:与第一客户端的物理地址关联存储的无线网络名称为PHICOMM,与第二客户端的物理地址关联存储的无线网络名称为PHICOMMA。则此时,客户端鉴权模块110通过判断函数,针对物理地址列表中的物理地址,根据与之关联的无线网络名称进行鉴权,即对于第一客户端来说,去除无线网络的当前名称随机增加的字符,使用无线网络名称PHICOMM对其鉴权;对于第二客户端来说,使用无线网络名称PHICOMMA对其进行鉴权。
本发明还提供了一种路由器,该路由器中包括上述的无线网络安全认证装置100。在该路由器中,通过添加该无线网络安全认证装置100,大大提高了无线网络的安全性能,防止用户蹭网。
如图4所示为本发明还提供的无线网络安全认证方法一种实施方式的流程 示意图,从图中可以看出,在该无线网络安全认证方法中包括:S1基于预设鉴权规则对客户端的无线网络连接进行鉴权;S2基于步骤S1中的鉴权结果对无线网络的当前名称进行修改。
更进一步来说,在步骤S1中具体包括:基于预设鉴权规则判断客户端的无线网络连接是否鉴权成功;预设鉴权规则包括:客户端连接无线网络过程中的鉴权失败频率阈值。在一个具体实施例中,将鉴权失败频率阈值设置为1分钟鉴权10次,这样,当某一客户端基于无线网络的当前名称在1分钟内输入10次认证密码且都认证失败,则该客户端鉴权失败,进入步骤S2修改无线网络的当前名称,并将修改后的无线网络名称广播出去,防止该客户端的蹭网(手动方式蹭网)。相对应地,若该客户端基于无线网络的当前名称在1分钟内输入小于10次(如1次、2次、5次等)认证密码时认证成功了,则说明该客户端鉴权成功了,则不修改该无线网络的当前名称,仍然广播无线网络的当前名称。
在步骤S2中具体包括:若步骤S1中客户端的无线网络连接鉴权失败,基于预设名称修改规则对无线网络的当前名称进行修改;预设名称修改规则中包括:基于无线网络的当前名称对其进行修改,包括在无线网络的当前名称中随机添加字符串后缀。在一个具体实施例中,假若无线网络的当前名称为PHICOMM,则修改后的名称为PHICOMM123,以此类推。
对上述实施方式进行改进,如图2所示为本发明还提供的无线网络安全认证方法另一种实施方式的流程示意图,从图中可以看出,在该无线网络安全认证方法中包括:S0基于唯一标识客户端的标识信息判定该客户端的身份是否合法;S1基于步骤S0中的认证结果和预设鉴权规则对客户端的无线网络连接进行鉴权;S2基于步骤S1中的鉴权结果对无线网络的当前名称进行修改。
具体,在步骤S0中包括:通过将客户端的物理地址与预存的物理地址列表进行比对判断该客户端的身份是否合法;在步骤S1中具体包括:基于步骤S0中的认证结果和预设鉴权规则判断是否使用无线网络的当前名称对客户端的无线网络连接进行鉴权。
更具体来说,上述唯一标识客户端的标识信息为客户端的物理地址,即无 线网卡的MAC地址。且在该物理地址列表中包括:授权客户端连接无线网络时的无线网络名称与该客户端物理地址的关联关系。基于此,在步骤S0中,首先获取客户端的物理地址,之后将其与物理地址列表进行比对,若能够在物理地址列表中匹配到当前客户端的物理地址,则说明该客户端为合法用户,之后基于以与该客户端的物理地址关联存储的无线网络名称对其进行鉴权。相反地,若不能在物理地址列表中匹配到当前客户端的物理地址,则基于无线网络的当前名称对该客户端进行鉴权。具体,若该客户端满足预设鉴权规则,即在规定时间内有限次数内鉴权成功,如1分钟内第10次鉴权成功(鉴权失败频率阈值为1分钟鉴权30次),则该客户端鉴权成功,将该客户端的物理地址添加到物理地址列表中形成新的物理地址列表。若该客户端不满足预设鉴权规则,则在步骤S2中按照预设名称修改规则对无线网络的当前名称进行修改。
要说明的是,在本实施方式中,若无线网络的当前名称为PHICOMM789,假若物理地址列表中包括2个客户端的物理地址,具体:与第一客户端的物理地址关联存储的无线网络名称为PHICOMM,与第二客户端的物理地址关联存储的无线网络名称为PHICOMMA。则此时,客户端鉴权模块110通过判断函数,针对物理地址列表中的物理地址,根据与之关联的无线网络名称进行鉴权,即对于第一客户端来说,去除无线网络的当前名称随机增加的字符,使用无线网络名称PHICOMM对其鉴权;对于第二客户端来说,使用无线网络名称PHICOMMA对其进行鉴权。
应当说明的是,上述实施例均可根据需要自由组合。以上所述仅是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。

Claims (10)

  1. 一种无线网络安全认证装置,其特征在于,所述无线网络安全认证装置中包括:客户端鉴权模块以及网络名称修改模块,其中,
    所述客户端鉴权模块,基于预设鉴权规则对客户端的无线网络连接进行鉴权;
    所述网络名称修改模块,与所述客户端鉴权模块连接,所述网络名称修改模块基于所述客户端鉴权模块的鉴权结果对无线网络的当前名称进行修改。
  2. 如权利要求1所述的无线网络安全认证装置,其特征在于,
    所述预设鉴权规则包括:客户端连接无线网络过程中的鉴权失败频率阈值;
    所述客户端鉴权模块基于所述预设鉴权规则判断客户端的无线网络连接是否鉴权成功。
  3. 如权利要求1或2所述的无线网络安全认证装置,其特征在于,所述无线网络安全认证装置中还包括一分别与所述客户端鉴权模块和网络名称修改模块连接的存储模块;
    所述存储模块中预存有预设鉴权规则和预设名称修改规则,所述网络名称修改模块基于所述预设名称修改规则对无线网络的当前名称进行修改;
    所述预设名称修改规则中包括:基于无线网络的当前名称对其进行修改,包括在无线网络的当前名称中随机添加字符串后缀。
  4. 如权利要求3所述的无线网络安全认证装置,其特征在于,所述无线网络安全认证装置中还包括与所述客户端鉴权模块连接的客户端身份认证模块;
    所述客户端身份认证模块基于唯一标识客户端的标识信息判定该客户端的身份是否合法;
    所述客户端鉴权模块基于所述客户端身份认证模块的认证结果和预设鉴 权规则对客户端的无线网络连接进行鉴权。
  5. 如权利要求4所述的无线网络安全认证装置,其特征在于,
    所述唯一标识客户端的标识信息为客户端的物理地址;
    所述客户端身份认证模块通过将客户端的物理地址与预存在存储模块中的物理地址列表进行比对判断该客户端的身份是否合法;所述物理地址列表中包括:授权客户端连接无线网络时的无线网络名称与该客户端物理地址的关联关系;
    所述客户端鉴权模块基于所述客户端身份认证模块的认证结果和预设鉴权规则判断是否使用无线网络的当前名称对客户端的无线网络连接进行鉴权。
  6. 一种路由器,其特征在于,所述路由器中包括如权利要求1-5任意一项所述的无线网络安全认证装置。
  7. 一种无线网络安全认证方法,其特征在于,所述无线网络安全认证方法中包括:
    S1基于预设鉴权规则对客户端的无线网络连接进行鉴权;
    S2基于步骤S1中的鉴权结果对无线网络的当前名称进行修改。
  8. 如权利要求7所述的无线网络安全认证方法,其特征在于,
    在步骤S1中具体包括:基于所述预设鉴权规则判断客户端的无线网络连接是否鉴权成功;所述预设鉴权规则包括:客户端连接无线网络过程中的鉴权失败频率阈值;和/或,
    在步骤S2中具体包括:若步骤S1中客户端的无线网络连接鉴权失败,基于预设名称修改规则对无线网络的当前名称进行修改;所述预设名称修改规则中包括:基于无线网络的当前名称对其进行修改,包括在无线网络的当前名称中随机添加字符串后缀。
  9. 如权利要求7或8所述的无线网络安全认证方法,其特征在于,
    在步骤S1之前还包括:S0基于唯一标识客户端的标识信息判定该客户端的身份是否合法;
    在步骤S1中具体包括:基于步骤S0中的认证结果和预设鉴权规则对客户端的无线网络连接进行鉴权。
  10. 如权利要求9所述的无线网络安全认证方法,其特征在于,
    在步骤S0中具体包括:通过将客户端的物理地址与预存的物理地址列表进行比对判断该客户端的身份是否合法;所述物理地址列表中包括:授权客户端连接无线网络时的无线网络名称与该客户端物理地址的关联关系;
    在步骤S1中具体包括:基于步骤S0中的认证结果和预设鉴权规则判断是否使用无线网络的当前名称对客户端的无线网络连接进行鉴权。
PCT/CN2017/085110 2016-08-23 2017-05-19 一种无线网络安全认证装置及其方法、一种路由器 WO2018036221A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610710632.6 2016-08-23
CN201610710632.6A CN106102066A (zh) 2016-08-23 2016-08-23 一种无线网络安全认证装置及其方法、一种路由器

Publications (1)

Publication Number Publication Date
WO2018036221A1 true WO2018036221A1 (zh) 2018-03-01

Family

ID=57225801

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/085110 WO2018036221A1 (zh) 2016-08-23 2017-05-19 一种无线网络安全认证装置及其方法、一种路由器

Country Status (2)

Country Link
CN (1) CN106102066A (zh)
WO (1) WO2018036221A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112995156A (zh) * 2021-02-09 2021-06-18 江苏信息职业技术学院 一种无线网络安全检测装置及方法
CN113765842A (zh) * 2020-06-01 2021-12-07 台众计算机股份有限公司 信息装置的网络联机管理系统

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106102066A (zh) * 2016-08-23 2016-11-09 上海斐讯数据通信技术有限公司 一种无线网络安全认证装置及其方法、一种路由器
CN113784277B (zh) * 2021-01-15 2024-05-17 北京京东振世信息技术有限公司 用于存储位置信息的系统、方法和装置

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013184433A1 (en) * 2012-06-08 2013-12-12 Time Warner Cable Inc. Wireless session configuration persistence
CN104333863A (zh) * 2014-10-20 2015-02-04 小米科技有限责任公司 连接管理方法及装置、电子设备
CN105208557A (zh) * 2015-10-08 2015-12-30 广东欧珀移动通信有限公司 一种安全建立wifi连接的方法及无线路由器
CN105379190A (zh) * 2013-05-07 2016-03-02 华为技术有限公司 用于指示服务集标识符的系统和方法
CN105516093A (zh) * 2015-11-30 2016-04-20 上海斐讯数据通信技术有限公司 一种防蹭网的方法及路由器
CN106102066A (zh) * 2016-08-23 2016-11-09 上海斐讯数据通信技术有限公司 一种无线网络安全认证装置及其方法、一种路由器

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7120129B2 (en) * 2001-03-13 2006-10-10 Microsoft Corporation System and method for achieving zero-configuration wireless computing and computing device incorporating same
CN105516074A (zh) * 2014-10-20 2016-04-20 中兴通讯股份有限公司 检测无线网络接入安全的方法及终端
CN104349508A (zh) * 2014-11-22 2015-02-11 深圳市梧桐世界科技有限公司 一种自动隐藏ssid的方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013184433A1 (en) * 2012-06-08 2013-12-12 Time Warner Cable Inc. Wireless session configuration persistence
CN105379190A (zh) * 2013-05-07 2016-03-02 华为技术有限公司 用于指示服务集标识符的系统和方法
CN104333863A (zh) * 2014-10-20 2015-02-04 小米科技有限责任公司 连接管理方法及装置、电子设备
CN105208557A (zh) * 2015-10-08 2015-12-30 广东欧珀移动通信有限公司 一种安全建立wifi连接的方法及无线路由器
CN105516093A (zh) * 2015-11-30 2016-04-20 上海斐讯数据通信技术有限公司 一种防蹭网的方法及路由器
CN106102066A (zh) * 2016-08-23 2016-11-09 上海斐讯数据通信技术有限公司 一种无线网络安全认证装置及其方法、一种路由器

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113765842A (zh) * 2020-06-01 2021-12-07 台众计算机股份有限公司 信息装置的网络联机管理系统
CN113765842B (zh) * 2020-06-01 2023-04-07 台众计算机股份有限公司 信息装置的网络联机管理系统
CN112995156A (zh) * 2021-02-09 2021-06-18 江苏信息职业技术学院 一种无线网络安全检测装置及方法
CN112995156B (zh) * 2021-02-09 2023-05-26 江苏信息职业技术学院 一种无线网络安全检测装置及方法

Also Published As

Publication number Publication date
CN106102066A (zh) 2016-11-09

Similar Documents

Publication Publication Date Title
US20200402046A1 (en) Unique transaction identifier, which may also include a time expiration value, is assigned by a first network website to an electronic instruction to collect specified distinctive identifiers from a local/mobile computing device seeking access to said first network website
CN108173822B (zh) 智能门锁管控方法、智能门锁及计算机可读存储介质
US8266681B2 (en) System and method for automatic network logon over a wireless network
US9131378B2 (en) Dynamic authentication in secured wireless networks
WO2017185913A1 (zh) 一种无线局域网认证机制的改进方法
US11310232B2 (en) Network identity authentication method and system, and user agent device used thereby
WO2018036221A1 (zh) 一种无线网络安全认证装置及其方法、一种路由器
WO2015043131A1 (zh) 无线网络认证方法及无线网络认证装置
US9730001B2 (en) Proximity based authentication using bluetooth
US11451959B2 (en) Authenticating client devices in a wireless communication network with client-specific pre-shared keys
JP2008500632A (ja) アドホックアクセス環境を提供するネットワークシステムおよび方法
WO2016078419A1 (zh) 一种开放授权方法、装置及开放平台
WO2011017924A1 (zh) 无线局域网的认证方法、系统、服务器和终端
CN110830446B (zh) 一种spa安全验证的方法和装置
US9853971B2 (en) Proximity based authentication using bluetooth
CN106304264B (zh) 一种无线网络接入方法及装置
CN106559785B (zh) 认证方法、设备和系统以及接入设备和终端
CN101237325B (zh) 以太网接入认证方法和下线认证方法以及以太网设备
CN103874069A (zh) 一种无线终端mac认证装置和方法
CN110995710A (zh) 一种基于eUICC的智能家居认证方法
JP2007018081A (ja) ユーザ認証システム、ユーザ認証方法、ユーザ認証方法を実現するためのプログラム、及びプログラムを記憶した記憶媒体
CN106789858B (zh) 一种访问控制方法和装置以及服务器
CN101867588A (zh) 一种基于802.1x的接入控制系统
CN101764788B (zh) 基于扩展802.1x认证系统的安全接入方法
CN105451225B (zh) 一种接入认证方法及接入认证设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17842646

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17842646

Country of ref document: EP

Kind code of ref document: A1