Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for detecting rogue access point device and access point device

A technology of illegal access point and access point equipment, which is applied in the field of methods, systems and access point equipment, can solve the problems of low accuracy rate, poor detection timeliness, and multi-human resource investment, so as to improve timeliness and accuracy , avoid poor timeliness and accuracy of detection, and reduce the effect of human resource investment

Active Publication Date: 2011-04-13
BEIJING XINWANG RUIJIE NETWORK TECH CO LTD
View PDF3 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Embodiments of the present invention provide a method, system, and access point device for detecting illegal access point devices, which are used to solve the problem that the detection of illegal access point devices must rely on configured detection rules and require more human resources in the prior art. , and the problems of poor detection timeliness and low accuracy caused by the inability to automatically configure and update detection rules

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting rogue access point device and access point device
  • Method and system for detecting rogue access point device and access point device
  • Method and system for detecting rogue access point device and access point device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] The method for detecting illegal access point equipment provided in the first embodiment of the present invention has a process as follows image 3 As shown, the execution steps are as follows:

[0036] Step S11: The access controller periodically issues authorization information of the successfully authorized access point AP device to the AP device.

[0037] In a wireless network, when an AP device is successfully registered to the access controller, it means that the AP device is successfully authorized. The AC will first issue the authorization information of the AP device itself to the AP device, and then the access controller will The authorization information of the AP device that has been successfully authorized can be issued to the AP device. What the access controller delivers to the AP device is the authorization information of all AP devices successfully registered on the access controller in the wireless network. Preferably, the sent authorization information of...

Embodiment 2

[0057] The method for detecting unauthorized access point devices provided by the second embodiment of the present invention is different from the first embodiment in that the access controller issues encrypted authorization information, and the AP device needs to use the decryption issued by the access controller The algorithm decrypts the encrypted authorization information to obtain the unencrypted authorization string contained in the authorization information. The method flow is as Figure 4 As shown, the execution steps are as follows:

[0058] Step S21: The access controller periodically issues the encrypted authorization information and decryption algorithm of the successfully authorized access point AP device to the AP device.

[0059] At this time, the authorization information of the successfully authorized AP device issued by the access controller is the encryption obtained after the access controller encrypts the authorization string in the authorization information in...

Embodiment 3

[0077] The method for detecting unauthorized access point devices provided in the third embodiment of the present invention is different from the first embodiment in that the access controller issues the authorization information, encryption algorithm and corresponding decryption algorithm of the successfully authorized AP device. The device uses an encryption algorithm to encrypt the authorization information and then sends it to the neighboring AP device. When receiving the encrypted authorization information sent by the neighboring AP device, it uses the corresponding decryption algorithm to decrypt it and obtains the unencrypted authorization characters contained in the authorization information. string. The method flow is as Figure 5 As shown, the execution steps are as follows:

[0078] Step S31: The access controller periodically issues the authorization information, encryption algorithm, and corresponding decryption algorithm of the successfully authorized access point A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for detecting a rogue access point device and the access point (AP) device. The method provided by the invention comprises the following steps: the authorization messages of the successfully authorized AP devices, which are issued by an access controller periodically are received; the authorization message of the AP device is sent to a neighbor AP device according to a set sending period; if the authorization message sent by the neighbor AP device is received in a set receiving period and matched with the authorization message of the neighbor AP device in the authorization messages of the successfully authorized AP devices, the neighbor AP device is judged to be a legal AP devices; and if the authorization message sent by the neighbor AP device is not received in the receiving period, or the received authorization message is not matched with the authorization message of the neighbor AP device in the authorization messages of the successfully authorized AP devices, the neighbor AP device is judged to be a rogue AP device. By adopting the method provided by the invention, the detection rule can not be configured manually, the investment in human resources can be reduced and the accuracy and timeliness of the detection can be increased.

Description

Technical field [0001] The present invention relates to the field of computer technology, in particular to a method, system and access point equipment for detecting illegal access point equipment in a wireless network. Background technique [0002] With the widespread application of wireless local area networks, more and more wireless network devices can transmit and receive wireless network signals. The wireless client in the wireless network using the 802.1x protocol will automatically select the wireless access point (AP) device with the best signal nearby to connect. Therefore, when an unauthorized AP device appears in a nearby network, the wireless client may also connect nearby, which can easily lead to the leakage of sensitive data. In order to ensure the security of wireless network communication and avoid potential threats to wireless network users by attackers who attempt to steal confidential information, authorize configuration and effective management of AP devices ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W24/00H04W48/08H04W12/122
Inventor 江涌
Owner BEIJING XINWANG RUIJIE NETWORK TECH CO LTD