Method and device of access point equipment for preventing error access

A wrong access and access point technology, which is applied in the direction of data exchange through path configuration, user identity/authority verification, etc., can solve the problems that other users' keys cannot be kept secret, and wireless terminals access WLAN, which is inconvenient. Achieve the effect of reducing the risk of user complaints, reducing the number of connection failures, and reducing the impact

Inactive Publication Date: 2008-03-12
NEW H3C TECH CO LTD
View PDF0 Cites 64 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, the AP and all the wireless terminals connected to it use the same key, and the users who use the same AP also use the same key, so it will bring the following problems: once the key of one of the users leaks, the keys of other users can't keep it secret
For example: two wireless terminals that are very close to each other belong to different APs, but in the process of searching for APs in the above step 201, since the SSID of the neighbor wireless terminal is the same as that of the neighbor wireless term

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device of access point equipment for preventing error access
  • Method and device of access point equipment for preventing error access
  • Method and device of access point equipment for preventing error access

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0055] First, the first embodiment of the method of the present invention is introduced:

[0056] In this embodiment, the SSID is hidden in the Beacon frame broadcasted by the AP device to each wireless terminal, and the wireless terminal searches for the SSID through the Probe Request method.

[0057] Refer to Figure 3, which is a flowchart of the first embodiment, including:

[0058] Step 301: The wireless terminal sends a Probe Request, requesting ProbeResponse including SSID, etc.;

[0059] Step 302: The AP device responds to the Probe Request of the wireless terminal and feeds back the ProbeResponse containing the SSID;

[0060] Among them, Probe Response includes the basic information of the BSS to which the AP belongs and the basic capability level of the AP.

[0061] In actual applications, due to the strength of the signal, it is very likely that there is a situation where the neighbor AP also feeds back Probe Response to the wireless terminal, and the feedback signal is ...

Example Embodiment

[0070] The following describes the second embodiment of the method of the present invention:

[0071] Unlike the hidden SSID of the Beacon frame in the first embodiment, the Beacon frame in this embodiment carries the SSID. The wireless terminal learns the SSID and other information by listening to the Beacon frame broadcast by the AP device. When the terminal prohibits access notification, a mismatch notification is sent to the wireless terminal to inform the wireless terminal that the SSID used by the wireless terminal does not match and cannot successfully log in to the network, so that the user can use other SSIDs to access the WLAN, and avoid the user from complaining without knowing.

[0072] Refer to Figure 4, which is a flowchart of the second embodiment, including:

[0073] Step 401: The AP device broadcasts a Beacon frame carrying the SSID;

[0074] Step 402: After listening to the Beacon frame, the wireless terminal requests authentication from the BRAS or AC controller...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The utility model discloses a method for guarding against the misconnection to the AP equipment. After the wireless terminal requires for the certification from the network via the AP equipment, the network will examine the validity of the wireless terminal. When the certification fails, the network equipment will record the illegal frequency of the wireless terminal's misconnection to the AP equipment. When the illegal frequency reaches the preset threshold, the network equipment will send the signal to the AP equipment for forbidding the wireless terminal access. After the signal is received by the AP equipment, the response t the wireless terminal is forbidden. The utility model can be used to effectively prevent the disabled user's access to the AP equipment. As the frequency of misconnection is arranged and dynamically adjusted, the influence to the user operation can be reduced, so as to lower the frequency of connect failure and the user's complains. As responding to the above method, the utility model also provides a device used for guarding against the misconnection to the AP equipment.

Description

technical field [0001] The present invention relates to the field of wireless local area network (Wireless LAN, WLAN) security technology, in particular to a method and device for preventing wrong access to access point (Access Point, AP) equipment. Background technique [0002] Due to the open transmission medium of wireless communication, the security performance of WLAN has always been the focus of attention. The currently established WLAN security mechanism mainly includes three aspects: service set identifier (Service SetIdentifier, SSID) mechanism, physical address (MAC) filtering control mechanism and the Wired Equivalent Privacy (WEP) mechanism, which will be introduced respectively below. [0003] 1. SSID [0004] In WLAN, different SSIDs are firstly configured for multiple access points, and wireless terminals must know the SSIDs in order to send and receive data in the network. If a mobile terminal attempts to access the WLAN, the AP first checks the SSID of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L12/28
Inventor 刘宝祥郑涛姚析张海涛
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products