Authentication method and device applied to WLAN (Wireless Local Area Network)
A verification method and a technology of a verification unit, which are applied in the field of network communication, can solve problems affecting network security, and achieve the effect of ensuring network security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] see figure 2 , figure 2 The basic flowchart provided for Embodiment 1 of the present invention. Such as figure 2 As shown, the process may include the following steps:
[0048] In step 201, the access device learns the assigned IP address of the client station.
[0049] Step 202, the access device synchronizes the learned IP address to the management device used to manage the access device, and receives a confirmation result from the management device as to whether the IP address has been used by other stations.
[0050] As for how the management device confirms whether the synchronized IP address has been used by another station belonging to the same link as the client, it will be described below.
[0051] Step 203, the access device verifies the data packet sent by the client by using the confirmed IP address, where the confirmed IP address refers to the IP address whose confirmation result is no.
[0052] It should be noted that the verification in step 203 i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



