WO2019095498A1 - 覆盖漏洞检测方法、系统、定位服务器及可读存储介质 - Google Patents

覆盖漏洞检测方法、系统、定位服务器及可读存储介质 Download PDF

Info

Publication number
WO2019095498A1
WO2019095498A1 PCT/CN2017/117345 CN2017117345W WO2019095498A1 WO 2019095498 A1 WO2019095498 A1 WO 2019095498A1 CN 2017117345 W CN2017117345 W CN 2017117345W WO 2019095498 A1 WO2019095498 A1 WO 2019095498A1
Authority
WO
WIPO (PCT)
Prior art keywords
client
signal strength
location
coverage
vulnerability
Prior art date
Application number
PCT/CN2017/117345
Other languages
English (en)
French (fr)
Inventor
王红雷
Original Assignee
成都西加云杉科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 成都西加云杉科技有限公司 filed Critical 成都西加云杉科技有限公司
Publication of WO2019095498A1 publication Critical patent/WO2019095498A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management

Definitions

  • the present invention relates to the field of data communication technologies, and in particular, to a coverage vulnerability detection method, system, AC, location server, and readable storage medium.
  • the current wireless network coverage vulnerability detection method adopted by the mainstream data communication industry is to work under the low RSSI (Received Signal Strength Indication) around some wireless access points (APs) in the network coverage.
  • RSSI Receiveived Signal Strength Indication
  • APs wireless access points
  • the number of non-roaming clients is recorded, and when the number of records exceeds a certain limit, it is determined that there is an overlay vulnerability around these APs to detect the coverage vulnerability.
  • the detection accuracy of this method is not high, and it is prone to misjudgment, and the detection time is too long, and the specific location of the coverage vulnerability cannot be accurately determined.
  • an object of the present invention is to provide a coverage vulnerability detection method, system, AC, location server, and readable storage medium.
  • the coverage vulnerability detection method has high detection accuracy and low false positive rate. It takes a short time and can accurately determine the specific location of the coverage vulnerability.
  • an embodiment of the present invention provides a coverage vulnerability detection method, where the method includes:
  • the wireless access device AP obtains the signal strength between each client and sends the obtained signal strength to the wireless controller (Wireless Access Point Controller, AC for short);
  • the wireless controller Wireless Access Point Controller, AC for short
  • the AC compares the signal strength between the same client and each AP in the signal coverage range with a preset signal strength threshold, and the signal strength between the client and each AP is smaller than the preset signal.
  • the strength threshold is determined, the suspected coverage vulnerability exists in the location corresponding to the client, and the signal strength between the client and the AP with the suspected coverage vulnerability is sent to the location server;
  • the positioning server locates the location of the client according to the location of each AP and the signal strength between the client and each AP, and detects the number of clients at the location, and determines the location according to the detection result. Whether there is an overlay vulnerability in the location.
  • an embodiment of the present invention further provides an overlay vulnerability detection method, which is applied to an AC, where the method includes:
  • the signal strength with each AP locates the location of the client, and determines whether the location has a coverage vulnerability based on the detection result of detecting the number of clients at the location.
  • an embodiment of the present invention further provides an overlay vulnerability detection method, which is applied to a location server, where the method includes:
  • the positioning server locates the location of the client according to the location of each AP sent by the AC and the signal strength between the client and each AP, and detects the number of clients at the location, according to the detection. As a result, it is determined whether there is a coverage vulnerability in the location, wherein the signal strength between the client and each AP is calculated by the AC according to the signal strength between the same client and each AP in the signal coverage range.
  • an embodiment of the present invention provides a coverage vulnerability detection system, where the system includes:
  • the wireless access device AP is configured to acquire the signal strength between each client and send the obtained signal strength to the wireless controller AC;
  • the wireless controller AC is configured to compare the signal strength between the same client and each AP in the signal coverage range with a preset signal strength threshold, and the signal strength between the client and each AP is When the preset signal strength threshold is smaller than the preset signal strength threshold, it is determined that the location corresponding to the client has a suspected coverage vulnerability, and the signal strength between the client and the AP with the suspected coverage vulnerability is sent to the location server.
  • the positioning server is configured to locate the location of the client according to the location of each AP and the signal strength between the client and each AP, and detect the number of clients at the location, according to the detection. As a result, it is determined whether there is an overlay vulnerability in the location.
  • an embodiment of the present invention provides a readable storage medium, where the computer program controls the AC where the readable storage medium is located to perform the coverage vulnerability detection method of the second aspect.
  • an embodiment of the present invention provides a readable storage medium, where the computer program controls the location server where the readable storage medium is located to perform the coverage vulnerability detection method of the third aspect.
  • the coverage vulnerability detection method has high detection precision and low false positive rate It takes a short time to accurately determine the specific location of the coverage vulnerability.
  • the method obtains the signal strength between each client through the wireless access device AP, and sends the acquired signal strength to the wireless controller AC.
  • the method uses the AC to connect the same client with the AC.
  • the signal strength between the APs in the signal coverage is compared with a preset signal strength threshold, and the client is determined when the signal strength between the client and each AP is less than the preset signal strength threshold.
  • FIG. 1 is a schematic diagram of interaction between an overlay vulnerability detection system and at least one client according to an embodiment of the present invention.
  • FIG. 2 is a schematic flowchart of a method for detecting an overlay vulnerability according to an embodiment of the present invention.
  • FIG. 3 is a schematic flow chart of the sub-steps included in step S210 shown in FIG. 2.
  • FIG. 4 is another schematic flow chart of the sub-steps included in step S210 shown in FIG. 2.
  • FIG. 5 is a schematic flow chart of the sub-steps included in step S220 shown in FIG. 2.
  • FIG. 6 is a second schematic flowchart of a method for detecting coverage vulnerability according to an embodiment of the present invention.
  • FIG. 7 is a third schematic flowchart of a method for detecting coverage vulnerability according to an embodiment of the present invention.
  • Icon 10-cover vulnerability detection system; 11-AP; 12-AC; 13-location server; 20-client.
  • the terms “set”, “install”, “connected”, and “connected” should be understood broadly, and may be a fixed connection, for example, unless otherwise specifically defined and defined. It may be a detachable connection, or an integral connection; it may be a mechanical connection or an electrical connection; it may be directly connected, or may be indirectly connected through an intermediate medium, and may be internal communication between the two elements. For those of ordinary skill in the art, specific circumstances can be The specific meaning of the above terms in the present invention is understood.
  • FIG. 1 is a schematic diagram of interaction between the coverage vulnerability detection system 10 and at least one client 20 according to an embodiment of the present invention.
  • the coverage vulnerability detection system 10 is in communication with the at least one client 20 for wireless network coverage of the at least one client 20, and provides a network for the at least one client 20. Communicating the service, and using the at least one client 20 to perform detection of a coverage error that may exist in the coverage of the wireless network coverage of the coverage vulnerability detection system 10, with high detection accuracy, low false positive rate, and short time detection, thereby covering The vulnerability is accurately positioned.
  • the coverage vulnerability detection system 10 may include at least one wireless access device AP11, a wireless controller AC12, and a positioning server 13, and the wireless access device AP11 is configured to perform communication connection with the corresponding client 20.
  • the wireless controller The AC 12 is in communication with the at least one wireless access device AP11, and is configured to control communication power of the at least one wireless access device AP11, and send the client 20 to the at least one wireless access device AP11.
  • the signal strength between the wireless access devices AP11 is processed to determine whether there is a suspected coverage vulnerability at the location corresponding to each client 20.
  • the location server 13 is configured to further determine the location of the suspected coverage vulnerability to detect A real coverage loophole.
  • the wireless access device AP11 may be an electronic device having a wireless access function; the positioning server 13 may be, but not limited to, a cloud server, a cluster server, a distribution server, etc.; the client 20 may be, However, it is not limited to a smart phone, a personal computer (PC), a tablet computer, a personal digital assistant (PDA), a mobile Internet device (MID), and the like.
  • PC personal computer
  • PDA personal digital assistant
  • MID mobile Internet device
  • FIG. 2 is a schematic flowchart of a method for detecting coverage vulnerability provided by an embodiment of the present invention.
  • the coverage vulnerability detection method is applied to the coverage vulnerability detection system 10 shown in FIG. 1, and the specific procedures and steps of the coverage vulnerability detection method shown in FIG. 2 are described in detail below.
  • the coverage vulnerability detection method includes the following steps:
  • step S210 the wireless access device AP11 acquires the signal strength between each client 20 and sends the acquired signal strength to the wireless controller AC12.
  • step S210 may include sub-step S211 and sub-step S212, wherein the sub-step S211 and the sub-step S212 are as follows:
  • Sub-step S211 the AP11 sends a beacon-report message acquisition request to the client 20 that is in communication with the AP11 according to a preset time interval.
  • the beacon-report packet obtaining request is used to obtain the beacon-report packet corresponding to the client 20, and the beacon-report packet includes the client 20 and the signal scanning thereof.
  • the client 20 After receiving the beacon-report packet obtaining request from the AP11, the client 20 responds to the beacon-report packet obtaining request, and the client 20 sends a beacon-report packet to the AP11.
  • the preset time interval may be 30s, or may be 50s, or may be 70s.
  • the specific time interval value may be differently set according to actual requirements, which is not limited in this embodiment.
  • Sub-step S212 the AP11 receives the beacon-report packet sent by the client 20 corresponding to the beacon-report packet obtaining request, and parses the beacon-report packet to obtain the client 20
  • the signal strength between each AP 11 and the resulting signal strength between the client 20 and each AP 11 are sent to the AC 12.
  • the AP 11 parses the received beacon-report packet to obtain the signal strength between the AP 20 and the AP 11 in the signal coverage range of the client 20 and the client.
  • the signal strength between the terminal 20 and each AP 11 is sent to the AC 12.
  • the AC 12 determines, according to the signal strength between each client 20 and the corresponding APs 11, whether there is a suspected coverage vulnerability at the location corresponding to the client 20.
  • step S210 may further include sub-step S213 and sub-step S214, wherein the sub-step S213 and the sub-step S214 are as follows:
  • Sub-step S213, the AP11 receives the probe request message broadcasted by each client 20, and obtains the signal strength between the AP11 and each client 20 based on the probe request message.
  • the client 20 when the client 20 is not in communication with each AP 11, the client 20 sends a probe request message to each AP 11 in a broadcast manner to access the wireless network corresponding to each AP 11.
  • the AP 11 will collect the probe request message broadcasted by each client 20, and obtain the signal strength between the AP 11 and the corresponding client 20 based on the RSSI in the received probe request message.
  • Sub-step S214 the AP11 sends the obtained signal strength between the AP11 and each client 20 to the AC12 according to a preset time interval.
  • the AP 11 after acquiring the signal strength between the AP 11 and each client 20 in the coverage area of the signal, the AP 11 stores the acquired signal strengths and according to preset time intervals.
  • the signal strength between the AP 11 and each client 20 within its signal coverage is sent to the AC 12.
  • the preset time interval may be 20s, 40s, or 80s, and the specific time interval values may be differently set according to actual needs.
  • the AC 12 compares the signal strength between the same client 20 and each AP 11 in the signal coverage range with a preset signal strength threshold, and the client 20 and each AP 11 When the signal strength between the two is less than the preset signal strength threshold, it is determined that there is a suspected coverage vulnerability in the corresponding location of the client 20, and the signal strength between the client 20 and the AP 11 having the suspected coverage vulnerability is transmitted at the corresponding location.
  • the positioning server 13 is given.
  • the client 20 when the client 20 is to be connected to the wireless network corresponding to the AP11, the client 20 needs to be located in the signal coverage range of the AP11, so that the client 20 can be associated with the corresponding AP11. Make a communication connection.
  • FIG. 5 is a schematic flowchart of the sub-steps included in step S220 shown in FIG. 2.
  • the step of comparing, by the AC12, the signal strength between the same client 20 and each AP 11 in the signal coverage range and the preset signal strength threshold in the step S220 may include the sub-step S221 and the sub-steps. S222, wherein the sub-step S221 and the sub-step S222 are as follows:
  • Sub-step S221 the AC 12 acquires the signal strength between each client 20 and each AP 11 within the signal coverage.
  • the AC 12 can sort the signal strengths sent by the APs 11 and the clients 20 to obtain the coverage of each client 20 within the signal coverage of the coverage vulnerability detection system 10. Signal strength between AP11.
  • Sub-step S222 the AC 12 compares the signal strength between each client 20 and each AP 11 with a preset signal strength threshold.
  • the AC 12 can determine whether there is a suspected coverage hole at the location of the corresponding client 20 by comparing the signal strength between each client 20 and the AP 11 with a preset signal strength threshold. .
  • the AC 12 may determine the corresponding client. There is a suspected coverage vulnerability at the location where the terminal 20 is located. At this time, the AC 12 sends the signal strength between the client 20 and the AP 11 corresponding to the location suspected coverage vulnerability to the location server 13 to make the location server. 13 further determining and detecting the suspected coverage vulnerability to determine whether the suspected coverage vulnerability is a true coverage vulnerability.
  • Step S230 the positioning server 13 locates the location of the client 20 according to the location of each AP 11 and the signal strength between the client 20 and each AP 11, and the number of clients 20 at the location. The detection is performed, and according to the detection result, it is determined whether the location has a coverage vulnerability.
  • the client 20 that the positioning server 13 performs positioning is the client 20 that has a suspected coverage vulnerability at the corresponding location determined by the AC 12.
  • the location server 13 may be configured according to the location of each AP 11 in the coverage of the coverage vulnerability detection system 10, and the client 20 that is determined to have a suspected coverage vulnerability
  • the signal strength between the APs 11 locates the location of the client 20.
  • the step of the positioning server 13 to locate the location of the client 20 according to the location of each AP 11 and the signal strength between the client 20 and each AP 11 may include:
  • the location server 13 is configured to the client 20 according to the distribution of each AP 11 in the map and the signal strength between the client 20 and each AP 11 having a suspected coverage vulnerability in the corresponding location by using a triangulation algorithm or a signal fingerprint algorithm. Position in the map to locate.
  • the location of the client 20 in the map is the location of the suspected coverage vulnerability in the map.
  • the location may correspond to a preset shape with the location location coordinates as the geometric center.
  • the area for example, circle, square, etc.).
  • the positioning server 13 detects the number of the client 20 at the location corresponding to the suspected coverage vulnerability, and determines the corresponding location according to the detection result. Whether the suspected coverage vulnerability is a true coverage vulnerability.
  • the step of detecting the number of clients 20 at the location, and determining, according to the detection result, whether the location has a coverage vulnerability includes:
  • the client 20 detected by the location server 13 at the location corresponding to the suspected coverage vulnerability is the client 20 located by the location server 13.
  • the embodiment of the present invention further provides an overlay vulnerability detection method.
  • the coverage vulnerability detection method describes the steps specifically performed by the AC 12 in the coverage vulnerability detection process from the AC12 side. It can be understood that the steps involved in the method for detecting the coverage vulnerability to be described next are described in the above embodiments. For details of the specific steps, reference may be made to the above embodiments, and only the steps of the AC12 side are briefly described below. Description. Referring to FIG. 6, the coverage vulnerability detection method executed in A12 may include the following steps.
  • Step S310 receiving the signal strength between the AP11 and each client sent by the AP11.
  • Step S320 comparing the signal strength between the same client and each AP11 in the signal coverage area with a preset signal strength threshold.
  • the step S320 includes:
  • the signal strength between each client and each AP 11 is compared to a preset signal strength threshold, respectively.
  • step S330 when the signal strength between the client 20 and each AP 11 is less than the preset signal strength threshold, it is determined that the location corresponding to the client 20 has a suspected coverage vulnerability, and the corresponding location is suspected.
  • the signal strength between the client that covers the vulnerability and each AP 11 is sent to the location server 13.
  • the location server 13 determines the location of each AP 11 and the client.
  • the signal strength between 20 and each AP 11 locates the location of the client 20, and determines whether the location has a coverage vulnerability based on the detection result of detecting the number of clients 20 at the location.
  • the embodiment of the present invention further provides an overlay vulnerability detection method.
  • the method for detecting the coverage vulnerability is different from the above embodiment, and the method for detecting the coverage vulnerability is described in the process of the coverage vulnerability detection process by the location server 13 from the location server 13 side. It can be understood that the steps involved in the method for detecting the coverage vulnerability to be described next are described in the above embodiments. For details of the specific steps, reference may be made to the above embodiments, and only steps are performed on the positioning server 13 side. Briefly explain. Referring to FIG. 7, the coverage vulnerability detection method executed in the location server 13 may include the following steps.
  • step S410 the location server 13 receives the location of each AP 11 sent by the AC 12 and the signal strength between the client 20 and each AP 11 , and locates the location of the client 20 .
  • step S410 can be implemented in the following manner:
  • the location server 13 is configured to the client 20 according to the distribution of each AP 11 in the map and the signal strength between the client 20 and each AP 11 having a suspected coverage vulnerability in the corresponding location by using a triangulation algorithm or a signal fingerprint algorithm. Position in the map to locate.
  • Step S420 detecting the number of clients 20 at the location, and determining, according to the detection result, whether the location has a coverage vulnerability.
  • the signal strength between the client 20 and each AP 11 is calculated by the AC 12 according to the signal strength between the same client 20 and each AP 11 in the signal coverage range.
  • the location server 13 is configured to the client 20 according to the distribution of each AP 11 in the map and the signal strength between the client 20 and each AP 11 having a suspected coverage vulnerability in the corresponding location by using a triangulation algorithm or a signal fingerprint algorithm. Position in the map to locate.
  • the wireless access device AP11 is configured to acquire a signal strength between each client 20 and send the acquired signal strength to the wireless controller AC12.
  • the wireless controller AC12 is configured to compare the signal strength between the same client 20 and each AP11 in the signal coverage range with a preset signal strength threshold, and the signal strength between the client 20 and each AP11.
  • the threshold is smaller than the preset signal strength threshold, it is determined that there is a suspected coverage vulnerability in the location corresponding to the client 20, and the signal strength between the client 20 and the AP 11 having the suspected coverage vulnerability is sent to the location server 13
  • the positioning server 13 is configured to locate the location of the client 20 according to the location of each AP 11 and the signal strength between the client 20 and each AP 11 , and the client 20 at the location The number is detected, and it is determined whether the location is stored according to the detection result. Covering the vulnerability.
  • the manner in which the wireless access device AP11 obtains the signal strength between each client 20 and sends the acquired signal strength to the wireless controller AC12 includes:
  • the AP 11 sends a beacon-report packet obtaining request to the client 20 that is in communication with the AP 11 according to the preset time interval, where the beacon-report packet includes the client 20 and each of the signal scanning ranges. Signal strength between AP11s;
  • the AP 11 receives the beacon-report packet sent by the client 20 corresponding to the beacon-report packet request, and parses the beacon-report packet to obtain the client 20 and each AP11.
  • the signal strength between the two is transmitted to the AC 12 between the obtained signal strength between the client 20 and each AP 11.
  • the manner in which the wireless access device AP11 obtains the signal strength between the clients 20 and sends the acquired signal strength to the wireless controller AC12 includes:
  • the AP 11 collects and receives the probe request message broadcasted by each client 20, and obtains the signal strength between the AP 11 and each client 20 based on the probe request message.
  • the AP 11 sends the obtained signal strength between the AP 11 and each client 20 to the AC 12 according to a preset time interval.
  • the manner in which the wireless controller AC12 compares the signal strength between the same client 20 and each AP 11 in the signal coverage range with a preset signal strength threshold includes:
  • the AC 12 acquires the signal strength between each client 20 and each AP 11 in the signal coverage area;
  • the AC 12 compares the signal strength between each client 20 and each AP 11 with a preset signal strength threshold.
  • the manner in which the location server 13 locates the location of the client 20 according to the location of each AP 11 and the signal strength between the client 20 and each AP 11 includes:
  • the location server 13 is configured to the client 20 according to the distribution of each AP 11 in the map and the signal strength between the client 20 and each AP 11 having a suspected coverage vulnerability in the corresponding location by using a triangulation algorithm or a signal fingerprint algorithm. Position in the map to locate.
  • the manner in which the location server 13 detects the number of clients 20 at the location, and determines whether the location has a coverage vulnerability according to the detection result includes:
  • the method steps or functions are implemented in the form of software functional modules and sold or used as separate products, they may be stored in a computer readable storage medium. Based on such understanding, the part of the technical solution of the present invention that contributes in essence or to the prior art or the part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium and includes instructions for causing a computing device (which may be a personal computer, an electronic device, or a network device, etc.) to perform all or part of the methods of the various embodiments of the present invention. step.
  • the location server locates the location of the client according to the location of each AP and the signal strength between the client and each AP, and detects the number of clients at the location, and determines according to the detection result. Whether there is a coverage vulnerability in the location, thereby achieving coverage detection with high detection accuracy, low false positive rate, short time-consuming, and accurate positioning of coverage vulnerabilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Position Fixing By Use Of Radio Waves (AREA)

Abstract

本发明提供一种覆盖漏洞检测方法、系统、AC、定位服务器及可读存储介质。所述方法包括:无线接入设备AP获取与各客户端之间的信号强度,并将获取到的信号强度发送给无线控制器AC;AC将同一客户端与各AP之间的信号强度与预设信号强度阈值进行比较,并在客户端对应的各信号强度均小于预设信号强度阈值时,判定客户端对应位置存在疑似覆盖漏洞,将对应位置存在疑似覆盖漏洞的客户端对应的各信号强度发送给定位服务器;定位服务器根据各AP的位置及客户端对应的各信号强度,对客户端的位置进行定位,并对所述位置处的客户端数目进行检测,根据检测结果判定所述位置是否存在覆盖漏洞。所述方法检测精度高,误判率低,耗时短,能够精准地确定出覆盖漏洞的具体位置。

Description

覆盖漏洞检测方法、系统、定位服务器及可读存储介质
本申请要求于2017年11月16日提交中国专利局的申请号为CN201711140659.7名称为“覆盖漏洞检测方法及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及数据通信技术领域,具体而言,涉及一种覆盖漏洞检测方法、系统、AC、定位服务器及可读存储介质。
背景技术
当前数据通信业界主流采用的无线网络覆盖漏洞检测方法,是通过对网络覆盖范围内某些无线访问接入点(Wireless Access Point,简称AP)周围的长期在低RSSI(Received Signal Strength Indication)下工作而不漫游的客户端的数目进行记录,并在记录的数目超过一定限值时判定这些AP周围存在覆盖漏洞,以实现对覆盖漏洞的检测。但这种方式的检测精度不高,易出现误判,且检测时间过长,无法精准地确定出覆盖漏洞的具体位置。
发明内容
为了克服现有技术中的上述不足,本发明的目的在于提供一种覆盖漏洞检测方法、系统、AC、定位服务器及可读存储介质,所述覆盖漏洞检测方法检测精度高,误判率低,耗时短,能够精准地确定出覆盖漏洞的具体位置。
第一方面,本发明的实施例提供一种覆盖漏洞检测方法,所述方法包括:
无线接入设备AP获取与各客户端之间的信号强度,并将获取到的信号强度发送给无线控制器(Wireless Access Point Controller,简称AC);
所述AC将同一客户端与信号覆盖范围内的各AP之间的信号强度与预设信号强度阈值进行比较,并在所述客户端与各AP之间的信号强度均小于所述预设信号强度阈值时,判定所述客户端对应的位置存在疑似覆盖漏洞,将对应的位置存在疑似覆盖漏洞的客户端与各AP之间的信号强度发送给定位服务器;
所述定位服务器根据各AP的位置及所述客户端与各AP之间的信号强度,对所述客户端的位置进行定位,并对所述位置处的客户端数目进行检测,根据检测结果判定所述位置是否存在覆盖漏洞。
第二方面,本发明的实施例还提供一种覆盖漏洞检测方法,应用于AC,所述方法包括:
接收AP发送的所述AP与各客户端之间的信号强度;
将同一客户端与信号覆盖范围内的各AP之间的信号强度与预设信号强度阈值进行比较;
在所述客户端与各AP之间的信号强度均小于所述预设信号强度阈值时,判定所述 客户端对应的位置存在疑似覆盖漏洞,将对应的位置存在疑似覆盖漏洞的客户端与各AP之间的信号强度发送给定位服务器,以由所述定位服务器根据各AP的位置及所述客户端与各AP之间的信号强度对所述客户端的位置进行定位,并根据对所述位置处的客户端数目进行检测的检测结果判定所述位置是否存在覆盖漏洞。
第三方面,本发明的实施例还提供一种覆盖漏洞检测方法,应用于定位服务器,所述方法包括:
所述定位服务器根据AC发送的各AP的位置及所述客户端与各AP之间的信号强度,对所述客户端的位置进行定位,并对所述位置处的客户端数目进行检测,根据检测结果判定所述位置是否存在覆盖漏洞,其中,所述客户端与各AP之间的信号强度由所述AC根据同一客户端与信号覆盖范围内的各AP之间的信号强度计算得到。
第四方面,本发明的实施例提供一种覆盖漏洞检测系统,所述系统包括:
无线接入设备AP,用于获取与各客户端之间的信号强度,并将获取到的信号强度发送给无线控制器AC;
所述无线控制器AC,用于将同一客户端与信号覆盖范围内的各AP之间的信号强度与预设信号强度阈值进行比较,并在所述客户端与各AP之间的信号强度均小于所述预设信号强度阈值时,判定所述客户端对应的位置存在疑似覆盖漏洞,将对应的位置存在疑似覆盖漏洞的客户端与各AP之间的信号强度发送给定位服务器
所述定位服务器,用于根据各AP的位置及所述客户端与各AP之间的信号强度,对所述客户端的位置进行定位,并对所述位置处的客户端数目进行检测,根据检测结果判定所述位置是否存在覆盖漏洞。
第五方面,本发明的实施例提供一种可读存储介质,所述计算机程序运行时控制所述可读存储介质所在AC执行第二方面的覆盖漏洞检测方法。
第六方面,本发明的实施例提供一种可读存储介质,所述计算机程序运行时控制所述可读存储介质所在定位服务器执行第三方面的覆盖漏洞检测方法。
相对于现有技术而言,本发明的实施例提供的覆盖漏洞检测方法、系统、AC、定位服务器及可读存储介质具有以下有益效果:所述覆盖漏洞检测方法检测精度高,误判率低,耗时短,能够精准地确定出覆盖漏洞的具体位置。首先,所述方法通过无线接入设备AP获取与各客户端之间的信号强度,并将获取到的信号强度发送给无线控制器AC;接着,所述方法通过所述AC将同一客户端与信号覆盖范围内的各AP之间的信号强度与预设信号强度阈值进行比较,并在所述客户端与各AP之间的信号强度均小于所述预设信号强度阈值时,判定所述客户端对应的位置存在疑似覆盖漏洞,将对应的位置存在疑似覆盖漏洞的客户端与各AP之间的信号强度发送给定位服务器;最后,所述方法通过所述定位服务器根 据各AP的位置及所述客户端与各AP之间的信号强度,对所述客户端的位置进行定位,并对所述位置处的客户端数目进行检测,根据检测结果判定所述位置是否存在覆盖漏洞,从而实现检测精度高、误判率低、耗时短且能够对覆盖漏洞进行精准定位的覆盖漏洞检测。
为使本发明的上述目的、特征和优点能更明显易懂,下文特举本发明实施例,并配合所附附图,作详细说明如下。
附图说明
为了更清楚地说明本发明实施例的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,应当理解,以下附图仅示出了本发明的某些实施例,因此不应被看作是对本发明权利要求保护范围的限定,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他相关的附图。
图1为本发明的实施例提供的覆盖漏洞检测系统与至少一个客户端之间的交互示意图。
图2为本发明的实施例提供的覆盖漏洞检测方法的流程示意图之一。
图3为图2中所示的步骤S210包括的子步骤的一种流程示意图。
图4为图2中所示的步骤S210包括的子步骤的另一种流程示意图。
图5为图2中所示的步骤S220包括的子步骤的一种流程示意图。
图6为本发明的实施例提供的覆盖漏洞检测方法的一种流程示意图之二。
图7为本发明的实施例提供的覆盖漏洞检测方法的一种流程示意图之三。
图标:10-覆盖漏洞检测系统;11-AP;12-AC;13-定位服务器;20-客户端。
具体实施方式
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。通常在此处附图中描述和示出的本发明实施例的组件可以以各种不同的配置来布置和设计。
因此,以下对在附图中提供的本发明的实施例的详细描述并非旨在限制要求保护的本发明的范围,而是仅仅表示本发明的选定实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
应注意到:相似的标号和字母在下面的附图中表示类似项,因此,一旦某一项在一个附图中被定义,则在随后的附图中不需要对其进行进一步定义和解释。
在本发明的描述中,需要说明的是,除非另有明确的规定和限定,术语“设置”、“安装”、“相连”、“连接”应做广义理解,例如,可以是固定连接,也可以是可拆卸连接,或一体地连接;可以是机械连接,也可以是电连接;可以是直接相连,也可以通过中间媒介间接相连,可以是两个元件内部的连通。对于本领域的普通技术人员而言,可以具体情 况理解上述术语在本发明中的具体含义。
下面结合附图,对本发明的一些实施方式作详细说明。在不冲突的情况下,下述的实施例及实施例中的特征可以相互组合。
请参照图1,是本发明的实施例提供的覆盖漏洞检测系统10与至少一个客户端20之间的交互示意图。在本发明实施例中,所述覆盖漏洞检测系统10与所述至少一个客户端20通信连接,用于对所述至少一个客户端20进行无线网络覆盖,为所述至少一个客户端20提供网络通信服务,并利用所述至少一个客户端20对所述覆盖漏洞检测系统10的无线网络覆盖范围内可能存在的覆盖漏洞进行检测精度高、误判率低、耗时短的检测,从而对覆盖漏洞进行精准定位。在本实施例中,所述覆盖漏洞检测系统10可以包括至少一个无线接入设备AP11、无线控制器AC12及定位服务器13,所述无线接入设备AP11用于与对应客户端20进行通信连接,以通过无线网络为所述客户端20提供网络通信服务,并相应地获取到对应客户端20与所述无线网络覆盖范围内的各无线接入设备AP11之间的信号强度;所述无线控制器AC12与所述至少一个无线接入设备AP11通信连接,用于对所述至少一个无线接入设备AP11的通信功率进行控制,并对所述至少一个无线接入设备AP11发送的客户端20与该无线接入设备AP11之间的信号强度进行处理,以判断各客户端20对应的位置处是否存在疑似覆盖漏洞;所述定位服务器13用于对存在疑似覆盖漏洞的位置进行进一步地判断,以检测出真正的覆盖漏洞。其中,所述无线接入设备AP11可以是具有无线接入功能的电子设备;所述定位服务器13可以是,但不限于,云端服务器、集群服务器、分布服务器等;所述客户端20可以是,但不限于,智能手机、个人电脑(Personal Computer,PC)、平板电脑、个人数字助理(Personal Digital Assistant,PDA)、移动上网设备(Mobile Internet Device,MID)等。
请参照图2,是本发明的实施例提供的覆盖漏洞检测方法的一种流程示意图。在本发明实施例中,所述覆盖漏洞检测方法应用于图1所示的覆盖漏洞检测系统10,下面对图2所示的覆盖漏洞检测方法的具体流程和步骤进行详细阐述。
在本发明实施例中,所述覆盖漏洞检测方法包括以下步骤:
步骤S210,无线接入设备AP11获取与各客户端20之间的信号强度,并将获取到的信号强度发送给无线控制器AC12。
请参照图3,是图2中所示的步骤S210包括的子步骤的一种流程示意图。在本实施例中,所述步骤S210可以包括子步骤S211及子步骤S212,其中所述子步骤S211及所述子步骤S212如下所示:
子步骤S211,所述AP11按照预设时间间隔向与所述AP11通信连接的客户端20发送beacon-report报文获取请求。
在本实施例中,所述beacon-report报文获取请求用于获取所述客户端20对应的beacon-report报文,所述beacon-report报文中包括所述客户端20与在其信号扫描范围内的各AP11之间的信号强度,其中所述beacon-report报文可以是符合802.11K通信标准的报文,相应地,所述客户端20为可以是支持802.11K通信标准的智能手机或其他移动终端。所述客户端20在接收到来自于所述AP11的beacon-report报文获取请求后,响应所述beacon-report报文获取请求,所述客户端20将beacon-report报文发送给所述AP11。其中,所述预设时间间隔可以是30s,也可以是50s,还可以是70s,具体的时间间隔数值可根据实际需求进行不同的设置,在本实施例中不做限定。
子步骤S212,所述AP11接收所述客户端20发送的与所述beacon-report报文获取请求对应的beacon-report报文,对所述beacon-report报文进行解析,得到所述客户端20与各AP11之间的信号强度,并将得到的所述客户端20与各AP11之间的信号强度发送给所述AC12。
在本实施例中,所述AP11通过对接收到的beacon-report报文进行解析,得到对应客户端20在AP11的信号覆盖范围内与各AP11之间的信号强度,并通过网络将所述客户端20与各AP11之间的信号强度发送给所述AC12。所述AC12根据每个客户端20与对应的各AP11之间的信号强度,判断所述客户端20对应的位置处是否存在疑似覆盖漏洞。
请参照图4,是图2中所示的步骤S210包括的子步骤的另一种流程示意图。在本实施例中,所述步骤S210还可以包括子步骤S213及子步骤S214,其中所述子步骤S213及所述子步骤S214如下所示:
子步骤S213,所述AP11接收各客户端20广播发送的探测请求报文,并基于所述探测请求报文得到所述AP11与各客户端20之间的信号强度。
在本实施例中,所述客户端20在未与各AP11进行通信连接时,所述客户端20将以广播的方式向各AP11发送探测请求报文,以接入各AP11对应的无线网络。所述AP11将对应采集各客户端20广播发送的探测请求报文,并基于接收到的探测请求报文中的RSSI得到所述AP11与对应客户端20之间的信号强度。
子步骤S214,所述AP11按照预设时间间隔将得到的所述AP11与各客户端20之间的信号强度发送给所述AC12。
在本实施例中,所述AP11在获取到所述AP11与其信号覆盖范围内的各客户端20之间的信号强度后,对获取到的各信号强度进行存储,并按照预设时间间隔地将所述AP11与其信号覆盖范围内的各客户端20之间的信号强度对应发送给所述AC12。其中,所述预设时间间隔可以是20s,也可以是40s,还可以是80s,具体的时间间隔数值可根据实际需求进行不同的设置。
请再次参照图2,步骤S220,所述AC12将同一客户端20与信号覆盖范围内的各AP11之间的信号强度与预设信号强度阈值进行比较,并在所述客户端20与各AP11之间的信号强度均小于所述预设信号强度阈值时,判定所述客户端20对应的位置存在疑似覆盖漏洞,将对应的位置存在疑似覆盖漏洞的客户端20与各AP11之间的信号强度发送给定位服务器13。
在本实施例中,所述客户端20要接入到AP11对应的无线网络时,需要所述客户端20位于所述AP11的信号覆盖范围内,以使所述客户端20能够与对应的AP11进行通信连接。
可选地,请参照图5,是图2中所示的步骤S220包括的子步骤的一种流程示意图。在本实施例中,所述步骤S220中所述AC12将同一客户端20与信号覆盖范围内的各AP11之间的信号强度与预设信号强度阈值进行比较的步骤可以包括子步骤S221及子步骤S222,其中所述子步骤S221及所述子步骤S222如下所示:
子步骤S221,所述AC12获取每个客户端20与信号覆盖范围内的各AP11之间的信号强度。
在本实施例中,所述AC12可通过对各AP11发送的与各客户端20之间的信号强度进行整理,得到每个客户端20在所述覆盖漏洞检测系统10的信号覆盖范围内的各AP11之间的信号强度。
子步骤S222,所述AC12将每个客户端20的与各AP11之间的所述信号强度分别与预设信号强度阈值进行比较。
在本实施例中,所述AC12可通过将每个客户端20与AP11之间的信号强度分别与预设信号强度阈值进行比较的方式,判断对应客户端20所在的位置处是否存在疑似覆盖漏洞。
在本实施例中,若同一客户端20与所述覆盖漏洞检测系统10的信号覆盖范围内的各AP11之间的信号强度均小于所述预设信号强度阈值时,所述AC12可判定对应客户端20所在的位置处存在疑似覆盖漏洞,此时所述AC12将对应位置疑似覆盖漏洞的客户端20的与所述各AP11之间的信号强度发送给所述定位服务器13,使所述定位服务器13对对应疑似覆盖漏洞进行进一步地判断检测,以判断所述疑似覆盖漏洞是否是真实的覆盖漏洞。
步骤S230,所述定位服务器13根据各AP11的位置及所述客户端20与各AP11之间的信号强度,对所述客户端20的位置进行定位,并对所述位置处的客户端20数目进行检测,根据检测结果判定所述位置是否存在覆盖漏洞。
在本实施例中,所述定位服务器13进行定位的客户端20为被所述AC12判定的对应位置处存在疑似覆盖漏洞的客户端20。所述定位服务器13可根据所述覆盖漏洞检测系统10信号覆盖范围内的各AP11的位置,及对应位置被判定存在疑似覆盖漏洞的客户端20与 各AP11之间的信号强度,对所述客户端20的位置进行定位。
可选地,在本实施例中,所述定位服务器13根据各AP11的位置及所述客户端20与各AP11之间的信号强度,对所述客户端20的位置进行定位的步骤可以包括:
所述定位服务器13根据地图中各AP11的分布情况,及对应位置存在疑似覆盖漏洞的客户端20与各AP11之间的信号强度,通过三角定位算法或信号指纹算法对所述客户端20在所述地图中的位置进行定位。
其中,所述客户端20在地图中的位置,即为疑似覆盖漏洞在所述地图中的位置,在本实施例中,所述位置可以对应为以定位地点坐标为几何中心的一预设形状(比如,圆形、正方形等)的区域。
在本实施例中,所述定位服务器13在对存在疑似覆盖漏洞的客户端20进行定位后,对所述疑似覆盖漏洞对应的位置处客户端20的数目进行检测,并根据检测结果判定对应位置处的疑似覆盖漏洞是否是真实的覆盖漏洞。
可选地,所述对所述位置处的客户端20数目进行检测,根据检测结果判定所述位置是否存在覆盖漏洞的步骤包括:
若检测到所述位置处的存在至少预设数量(比如,2个、3个等)的被定位的客户端20,则判定所述位置存在覆盖漏洞。
在本实施例中,所述定位服务器13在疑似覆盖漏洞对应的位置处检测的客户端20均为被所述定位服务器13定位的客户端20。
本发明实施例还提供一种覆盖漏洞检测方法,与上面实施例不同的是,本覆盖漏洞检测方法是从AC12侧描述AC12在覆盖漏洞检测过程中具体执行的步骤。可以理解的是,接下来要描述的覆盖漏洞检测方法中涉及的步骤在上面实施例中已经描述过,具体各个步骤的详尽内容可参照上面的实施例描述,下面仅对AC12侧执行步骤进行简要说明。请参照图6,在A12中执行的覆盖漏洞检测方法可以包括以下步骤。
步骤S310,接收AP11发送的所述AP11与各客户端之间的信号强度。
步骤S320,将同一客户端与信号覆盖范围内的各AP11之间的信号强度与预设信号强度阈值进行比较。
在本实施例中,所述步骤S320包括:
获取每个客户端与信号覆盖范围内的各AP11之间的信号强度;
将每个客户端的与各AP11之间的所述信号强度分别与预设信号强度阈值进行比较。
步骤S330,在所述客户端20与各AP11之间的信号强度均小于所述预设信号强度阈值时,判定所述客户端20对应的位置存在疑似覆盖漏洞,将对应的位置存在疑似覆 盖漏洞的客户端与各AP11之间的信号强度发送给定位服务器13。
在本实施例中,在将对应的位置存在疑似覆盖漏洞的客户端20与各AP11之间的信号强度发送给定位服务器13后,由所述定位服务器13根据各AP11的位置及所述客户端20与各AP11之间的信号强度对所述客户端20的位置进行定位,并根据对所述位置处的客户端20数目进行检测的检测结果判定所述位置是否存在覆盖漏洞。
本发明实施例还提供一种覆盖漏洞检测方法,与上面实施例不同的是,本覆盖漏洞检测方法是从定位服务器13侧描述定位服务器13在覆盖漏洞检测过程中具体执行的步骤。可以理解的是,接下来要描述的覆盖漏洞检测方法中涉及的步骤在上面实施例中已经描述过,具体各个步骤的详尽内容可参照上面的实施例描述,下面仅对定位服务器13侧执行步骤进行简要说明。请参照图7,在定位服务器13中执行的覆盖漏洞检测方法可以包括以下步骤。
步骤S410,所述定位服务器13接收AC12发送的各AP11的位置及所述客户端20与各AP11之间的信号强度,对所述客户端20的位置进行定位。
在本实施例中,步骤S410可以通过以下方式实现:
所述定位服务器13根据地图中各AP11的分布情况,及对应位置存在疑似覆盖漏洞的客户端20与各AP11之间的信号强度,通过三角定位算法或信号指纹算法对所述客户端20在所述地图中的位置进行定位。
步骤S420,对所述位置处的客户端20数目进行检测,根据检测结果判定所述位置是否存在覆盖漏洞。
其中,所述客户端20与各AP11之间的信号强度由所述AC12根据同一客户端20与信号覆盖范围内的各AP11之间的信号强度计算得到。
所述定位服务器13根据地图中各AP11的分布情况,及对应位置存在疑似覆盖漏洞的客户端20与各AP11之间的信号强度,通过三角定位算法或信号指纹算法对所述客户端20在所述地图中的位置进行定位。
请再次参照图1,在本发明实施例中,所述无线接入设备AP11,用于获取与各客户端20之间的信号强度,并将获取到的信号强度发送给无线控制器AC12;所述无线控制器AC12,用于将同一客户端20与信号覆盖范围内的各AP11之间的信号强度与预设信号强度阈值进行比较,并在所述客户端20与各AP11之间的信号强度均小于所述预设信号强度阈值时,判定所述客户端20对应的位置存在疑似覆盖漏洞,将对应的位置存在疑似覆盖漏洞的客户端20与各AP11之间的信号强度发送给定位服务器13;所述定位服务器13,用于根据各AP11的位置及所述客户端20与各AP11之间的信号强度,对所述客户端20的位置进行定位,并对所述位置处的客户端20数目进行检测,根据检测结果判定所述位置是否存 在覆盖漏洞。
其中,在本实施例的一种实施方式中,所述无线接入设备AP11获取与各客户端20之间的信号强度,并将获取到的信号强度发送给无线控制器AC12的方式包括:
所述AP11按照预设时间间隔向与所述AP11通信连接的客户端20发送beacon-report报文获取请求,其中所述beacon-report报文中包括所述客户端20与信号扫描范围内的各AP11之间的信号强度;
所述AP11接收所述客户端20发送的与所述beacon-report报文获取请求对应的beacon-report报文,对所述beacon-report报文进行解析,得到所述客户端20与各AP11之间的信号强度,并将得到的所述客户端20与各AP11之间的信号强度发送给所述AC12。
在本实施例的另一种实施方式中,所述无线接入设备AP11获取与各客户端20之间的信号强度,并将获取到的信号强度发送给无线控制器AC12的方式包括:
所述AP11对各客户端20广播发送的探测请求报文进行采集接收,并基于所述探测请求报文得到所述AP11与各客户端20之间的信号强度;
所述AP11按照预设时间间隔将得到的所述AP11与各客户端20之间的信号强度发送给所述AC12。
在本实施例中,所述无线控制器AC12将同一客户端20与信号覆盖范围内的各AP11之间的信号强度与预设信号强度阈值进行比较的方式包括:
所述AC12获取每个客户端20与信号覆盖范围内的各AP11之间的信号强度;
所述AC12将每个客户端20的与各AP11之间的所述信号强度分别与预设信号强度阈值进行比较。
在本实施例中,所述定位服务器13根据各AP11的位置及所述客户端20与各AP11之间的信号强度,对所述客户端20的位置进行定位的方式包括:
所述定位服务器13根据地图中各AP11的分布情况,及对应位置存在疑似覆盖漏洞的客户端20与各AP11之间的信号强度,通过三角定位算法或信号指纹算法对所述客户端20在所述地图中的位置进行定位。
所述定位服务器13对所述位置处的客户端20数目进行检测,根据检测结果判定所述位置是否存在覆盖漏洞的方式包括:
若检测到所述位置处的存在至少预设数量的被定位的客户端20,则判定所述位置存在覆盖漏洞。
若所述方法步骤或者功能以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出 来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算设备(可以是个人计算机,电子设备,或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。
工业实用性
通过所述定位服务器根据各AP的位置及所述客户端与各AP之间的信号强度,对所述客户端的位置进行定位,并对所述位置处的客户端数目进行检测,根据检测结果判定所述位置是否存在覆盖漏洞,从而实现检测精度高、误判率低、耗时短且能够对覆盖漏洞进行精准定位的覆盖漏洞检测

Claims (19)

  1. 一种覆盖漏洞检测方法,其特征在于,所述方法包括:
    无线接入设备AP获取与各客户端之间的信号强度,并将获取到的信号强度发送给无线控制器AC;
    所述AC将同一客户端与信号覆盖范围内的各AP之间的信号强度与预设信号强度阈值进行比较,并在所述客户端与各AP之间的信号强度均小于所述预设信号强度阈值时,判定所述客户端对应的位置存在疑似覆盖漏洞,将对应的位置存在疑似覆盖漏洞的客户端与各AP之间的信号强度发送给定位服务器;
    所述定位服务器根据各AP的位置及所述客户端与各AP之间的信号强度,对所述客户端的位置进行定位,并对所述位置处的客户端数目进行检测,根据检测结果判定所述位置是否存在覆盖漏洞。
  2. 根据权利要求1所述的方法,其特征在于,所述无线接入设备AP获取与各客户端之间的信号强度,并将获取到的信号强度发送给无线控制器AC的步骤包括:
    所述AP按照预设时间间隔向与所述AP通信连接的客户端发送beacon-report报文获取请求,其中所述beacon-report报文中包括所述客户端与信号扫描范围内的各AP之间的信号强度;
    所述AP接收所述客户端发送的与所述beacon-report报文获取请求对应的beacon-report报文,对所述beacon-report报文进行解析,得到所述客户端与各AP之间的信号强度,并将得到的所述客户端与各AP之间的信号强度发送给所述AC。
  3. 根据权利要求1所述的方法,其特征在于,所述无线接入设备AP获取与各客户端之间的信号强度,并将获取到的信号强度发送给无线控制器AC的步骤包括:
    所述AP接收各客户端广播发送的探测请求报文,并基于所述探测请求报文得到所述AP与各客户端之间的信号强度;
    所述AP按照预设时间间隔将得到的所述AP与各客户端之间的信号强度发送给所述AC。
  4. 根据权利要求1-3中任意一项所述的方法,其特征在于,所述AC将同一客户端与信号覆盖范围内的各AP之间的信号强度与预设信号强度阈值进行比较的步骤包括:
    所述AC获取每个客户端与信号覆盖范围内的各AP之间的信号强度;
    所述AC将每个客户端的与各AP之间的所述信号强度分别与预设信号强度阈值进行比较。
  5. 根据权利要求1-3中任意一项所述的方法,其特征在于,所述定位服务器根据各AP的位置及所述客户端与各AP之间的信号强度,对所述客户端的位置进行定位的步 骤,包括:
    所述定位服务器根据地图中各AP的分布情况,及对应位置存在疑似覆盖漏洞的客户端与各AP之间的信号强度,通过三角定位算法或信号指纹算法对所述客户端在所述地图中的位置进行定位。
  6. 根据权利要求1-3中任意一项所述的方法,其特征在于,所述对所述位置处的客户端数目进行检测,根据检测结果判定所述位置是否存在覆盖漏洞的步骤包括:
    若检测到所述位置处的存在至少预设数量的被定位的客户端,则判定所述位置存在覆盖漏洞。
  7. 一种覆盖漏洞检测方法,其特征在于,应用于无线控制器AC,所述方法包括:
    接收无线接入设备AP发送的所述AP与各客户端之间的信号强度;
    将同一客户端与信号覆盖范围内的各AP之间的信号强度与预设信号强度阈值进行比较;
    在所述客户端与各AP之间的信号强度均小于所述预设信号强度阈值时,判定所述客户端对应的位置存在疑似覆盖漏洞,将对应的位置存在疑似覆盖漏洞的客户端与各AP之间的信号强度发送给定位服务器,以由所述定位服务器根据各AP的位置及所述客户端与各AP之间的信号强度对所述客户端的位置进行定位,并根据对所述位置处的客户端数目进行检测的检测结果判定所述位置是否存在覆盖漏洞。
  8. 如权利要求7所述的方法,其特征在于,所述将同一客户端与信号覆盖范围内的各AP之间的信号强度与预设信号强度阈值进行比较的步骤,包括:
    获取每个客户端与信号覆盖范围内的各AP之间的信号强度;
    将每个客户端的与各AP之间的所述信号强度分别与预设信号强度阈值进行比较。
  9. 一种覆盖漏洞检测方法,其特征在于,应用于定位服务器,所述方法包括:
    所述定位服务器根据无线控制器AC发送的各无线接入设备AP的位置及所述客户端与各AP之间的信号强度,对所述客户端的位置进行定位;
    对所述位置处的客户端数目进行检测,根据检测结果判定所述位置是否存在覆盖漏洞,其中,所述客户端与各AP之间的信号强度由所述AC根据同一客户端与信号覆盖范围内的各AP之间的信号强度计算得到。
  10. 如权利要求9所述的方法,其特征在于,所述定位服务器根据各AP的位置及所述客户端与各AP之间的信号强度,对所述客户端的位置进行定位的步骤,包括:
    所述定位服务器根据地图中各AP的分布情况,及对应位置存在疑似覆盖漏洞的客户端与各AP之间的信号强度,通过三角定位算法或信号指纹算法对所述客户端在所述地图中的位置进行定位。
  11. 如权利要求9或10所述的方法,其特征在于,所述对所述位置处的客户端数目进行检测,根据检测结果判定所述位置是否存在覆盖漏洞的步骤包括:
    若检测到所述位置处的存在至少预设数量的被定位的客户端,则判定所述位置存在覆盖漏洞。
  12. 一种无线控制器AC,包括处理器及存储有若干计算机指令的非易失性存储器,其特征在于,所述计算机指令被所述处理器执行时,所述AC执行权利要求7-8中任意一项所述的覆盖漏洞检测方法。
  13. 一种定位服务器,包括处理器及存储有若干计算机指令的非易失性存储器,其特征在于,所述计算机指令被所述处理器执行时,所述定位服务器执行权利要求9-11中任意一项所述的覆盖漏洞检测方法。
  14. 一种覆盖漏洞检测系统,其特征在于,所述系统包括:
    无线接入设备AP,用于获取与各客户端之间的信号强度,并将获取到的信号强度发送给无线控制器AC;
    所述无线控制器AC,用于将同一客户端与信号覆盖范围内的各AP之间的信号强度与预设信号强度阈值进行比较,并在所述客户端与各AP之间的信号强度均小于所述预设信号强度阈值时,判定所述客户端对应的位置存在疑似覆盖漏洞,将对应的位置存在疑似覆盖漏洞的客户端与各AP之间的信号强度发送给定位服务器
    所述定位服务器,用于根据各AP的位置及所述客户端与各AP之间的信号强度,对所述客户端的位置进行定位,并对所述位置处的客户端数目进行检测,根据检测结果判定所述位置是否存在覆盖漏洞。
  15. 根据权利要求14所述的系统,其特征在于,所述无线接入设备AP获取与各客户端之间的信号强度,并将获取到的信号强度发送给无线控制器AC的方式包括:
    所述AP按照预设时间间隔向与所述AP通信连接的客户端发送beacon-report报文获取请求,其中所述beacon-report报文中包括所述客户端与信号扫描范围内的各AP之间的信号强度;
    所述AP接收所述客户端发送的与所述beacon-report报文获取请求对应的beacon-report报文,对所述beacon-report报文进行解析,得到所述客户端与各AP之间的信号强度,并将得到的所述客户端与各AP之间的信号强度发送给所述AC。
  16. 根据权利要求14所述的系统,其特征在于,所述无线接入设备AP获取与各客户端之间的信号强度,并将获取到的信号强度发送给无线控制器AC的方式包括:
    所述AP对各客户端广播发送的探测请求报文进行采集接收,并基于所述探测请求报文得到所述AP与各客户端之间的信号强度;
    所述AP按照预设时间间隔将得到的所述AP与各客户端之间的信号强度发送给所述AC。
  17. 根据权利要求14-16中任意一项所述的系统,其特征在于,所述定位服务器对所述位置处的客户端数目进行检测,根据检测结果判定所述位置是否存在覆盖漏洞的方式包括:
    若检测到所述位置处的存在至少预设数量的被定位的客户端,则判定所述位置存在覆盖漏洞。
  18. 一种可读存储介质,所述可读存储介质包括计算机程序,其特征在于:
    所述计算机程序运行时控制所述可读存储介质所在无线控制器AC执行权利要求7-8中任意一项所述的覆盖漏洞检测方法。
  19. 一种可读存储介质,所述可读存储介质包括计算机程序,其特征在于:
    所述计算机程序运行时控制所述可读存储介质所在定位服务器执行权利要求9-11中任意一项所述的覆盖漏洞检测方法。
PCT/CN2017/117345 2017-11-16 2017-12-20 覆盖漏洞检测方法、系统、定位服务器及可读存储介质 WO2019095498A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201711140659.7A CN107911787B (zh) 2017-11-16 2017-11-16 覆盖漏洞检测方法及系统
CN201711140659.7 2017-11-16

Publications (1)

Publication Number Publication Date
WO2019095498A1 true WO2019095498A1 (zh) 2019-05-23

Family

ID=61846020

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/117345 WO2019095498A1 (zh) 2017-11-16 2017-12-20 覆盖漏洞检测方法、系统、定位服务器及可读存储介质

Country Status (2)

Country Link
CN (1) CN107911787B (zh)
WO (1) WO2019095498A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116506932B (zh) * 2023-06-28 2023-09-26 新华三技术有限公司 功率调整方法、装置、设备及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101299867A (zh) * 2007-12-27 2008-11-05 华为技术有限公司 一种网络覆盖检测的方法、装置和系统
CN101420711A (zh) * 2007-10-22 2009-04-29 华为技术有限公司 提供测量信息、检测覆盖问题的方法、装置及系统
CN102905304A (zh) * 2012-10-30 2013-01-30 中国联合网络通信集团有限公司 网络覆盖检测方法及装置
CN103634810A (zh) * 2013-12-24 2014-03-12 山东润谱通信工程有限公司 一种室内无线网络覆盖问题区域定位的方法
CN105453635A (zh) * 2013-07-26 2016-03-30 英特尔Ip公司 网络覆盖空洞检测
CN107113639A (zh) * 2014-11-17 2017-08-29 三星电子株式会社 用于在无线通信系统中控制接入点操作的方法

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8526368B2 (en) * 2011-05-17 2013-09-03 Qualcomm Incorporated Wi-Fi access point characteristics database

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420711A (zh) * 2007-10-22 2009-04-29 华为技术有限公司 提供测量信息、检测覆盖问题的方法、装置及系统
CN101299867A (zh) * 2007-12-27 2008-11-05 华为技术有限公司 一种网络覆盖检测的方法、装置和系统
CN102905304A (zh) * 2012-10-30 2013-01-30 中国联合网络通信集团有限公司 网络覆盖检测方法及装置
CN105453635A (zh) * 2013-07-26 2016-03-30 英特尔Ip公司 网络覆盖空洞检测
CN103634810A (zh) * 2013-12-24 2014-03-12 山东润谱通信工程有限公司 一种室内无线网络覆盖问题区域定位的方法
CN107113639A (zh) * 2014-11-17 2017-08-29 三星电子株式会社 用于在无线通信系统中控制接入点操作的方法

Also Published As

Publication number Publication date
CN107911787A (zh) 2018-04-13
CN107911787B (zh) 2020-04-28

Similar Documents

Publication Publication Date Title
US8918103B2 (en) Location data regression
US9838840B1 (en) Detecting proximity using WiFi hotspots
US9451397B1 (en) Detecting proximity using WiFi hotspots
EP3094986B1 (en) Range-free proximity determination
WO2017020654A1 (zh) 无线网络接入方法和装置
US9154910B2 (en) Terminal location obtaining method, device, and system
US9413805B2 (en) Geolocation engine
WO2021254261A1 (zh) 一种设备定位方法及装置
WO2020186659A1 (zh) 一种智能设备的定位方法及智能设备
CN107666662B (zh) 一种终端识别方法和接入点
WO2017107682A1 (zh) 基于无线网络的定位方法、装置及智能终端
US20140221009A1 (en) Method, system and apparatus for collecting location information
US20150347437A1 (en) Most Relevant Application Recommendation Based on Crowd-Sourced Application Usage Data
KR20140067153A (ko) 관련 장소들 사이의 관계들 이용
CN111179461A (zh) 基于bim模型的巡检记录生成方法、设备及存储介质
US10205746B2 (en) Anti-spoofing protection in an automotive environment
WO2017054307A1 (zh) 用户信息的识别方法及装置
WO2019095498A1 (zh) 覆盖漏洞检测方法、系统、定位服务器及可读存储介质
CN109068374B (zh) 驻留poi确定方法、装置、终端及存储介质
JP2019135817A (ja) 情報処理装置及びプログラム
CN108307414B (zh) 应用程序的Wi-Fi连接异常处理方法、装置、终端及存储介质
US10848916B2 (en) Service provision device, service provision method, and program storage medium
US20180295471A1 (en) Systems and Methods for Beacon Location Verification
CN113411743A (zh) 一种终端定位方法、装置及终端
CN104883735A (zh) 一种基于移动互联网的精准位置判断方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17931990

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17931990

Country of ref document: EP

Kind code of ref document: A1