Method and system for detecting rogue access point device and access point device
A technology of illegal access point and access point equipment, which is applied in the field of methods, systems and access point equipment, can solve the problems of low accuracy rate, poor detection timeliness, and multi-human resource investment, so as to improve timeliness and accuracy , avoid poor timeliness and accuracy of detection, and reduce the effect of human resource investment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] The method for detecting illegal access point equipment provided in the first embodiment of the present invention has a process as follows image 3 As shown, the execution steps are as follows:
[0036] Step S11: The access controller periodically issues authorization information of the successfully authorized access point AP device to the AP device.
[0037] In a wireless network, when an AP device is successfully registered to the access controller, it means that the AP device is successfully authorized. The AC will first issue the authorization information of the AP device itself to the AP device, and then the access controller will The authorization information of the AP device that has been successfully authorized can be issued to the AP device. What the access controller delivers to the AP device is the authorization information of all AP devices successfully registered on the access controller in the wireless network. Preferably, the sent authorization information of...
Embodiment 2
[0057] The method for detecting unauthorized access point devices provided by the second embodiment of the present invention is different from the first embodiment in that the access controller issues encrypted authorization information, and the AP device needs to use the decryption issued by the access controller The algorithm decrypts the encrypted authorization information to obtain the unencrypted authorization string contained in the authorization information. The method flow is as Figure 4 As shown, the execution steps are as follows:
[0058] Step S21: The access controller periodically issues the encrypted authorization information and decryption algorithm of the successfully authorized access point AP device to the AP device.
[0059] At this time, the authorization information of the successfully authorized AP device issued by the access controller is the encryption obtained after the access controller encrypts the authorization string in the authorization information in...
Embodiment 3
[0077] The method for detecting unauthorized access point devices provided in the third embodiment of the present invention is different from the first embodiment in that the access controller issues the authorization information, encryption algorithm and corresponding decryption algorithm of the successfully authorized AP device. The device uses an encryption algorithm to encrypt the authorization information and then sends it to the neighboring AP device. When receiving the encrypted authorization information sent by the neighboring AP device, it uses the corresponding decryption algorithm to decrypt it and obtains the unencrypted authorization characters contained in the authorization information. string. The method flow is as Figure 5 As shown, the execution steps are as follows:
[0078] Step S31: The access controller periodically issues the authorization information, encryption algorithm, and corresponding decryption algorithm of the successfully authorized access point A...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 