Method for monitoring illegal access device and apparatus thereof

An illegal access and monitoring device technology, applied in the network field, can solve the problems of increasing the difficulty of illegal access equipment, unable to completely eliminate the phenomenon of rubbing the network, and difficult to detect in time.

Inactive Publication Date: 2012-01-11
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF3 Cites 48 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, users can use the method of encrypting the account of the wireless access device to prevent the phenomenon of network scraping, but this method only increases the difficulty of illegal access devices to access the wireless network, and cannot fundamentally eliminate the phenomenon of network fraud. Phenomenon, once the hacker successfully invades, it is difficult to be discovered in time
In addition, the use of this encryption method requires users to have a high level of professional technology, which is difficult to promote
In the prior art, there is also a method of using special equipment to prevent the phenomenon of rubbing the network, such as wireless routers and supporting network cards with anti-scrambling networks released by some manufacturers, but the compatibility of this special equipment is low, and the cost is relatively high. High, increasing the burden on users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for monitoring illegal access device and apparatus thereof
  • Method for monitoring illegal access device and apparatus thereof
  • Method for monitoring illegal access device and apparatus thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] This embodiment 1 provides a method for monitoring illegal access devices, which is applicable to various system architectures that can provide wireless access network functions. For example, a current typical system architecture is to set a wireless router on the terminal side. The wireless router accesses the Internet through a cable, and the user accesses the wireless router wirelessly through a terminal device. The method of this embodiment can be implemented by the monitoring device of the illegal access device, and the monitoring device of the illegal access device can be integrated in the wireless router, that is, all or part of the steps of the method can be implemented through program instructions related to the wireless router. hardware to complete. The device for monitoring illegal access equipment can also be integrated in the terminal equipment, and can be completed through program instructions to relevant hardware in the terminal equipment. Such as figur...

Embodiment 2

[0045] The second embodiment further describes the method for monitoring illegally accessed devices in the first embodiment, wherein step 101 may include:

[0046]Regularly query the preset address resolution list in all devices connected to the wireless router, and obtain at least one of the device's IP address, device MAC address and device user name from the address resolution list.

[0047] Step 102 may include:

[0048] Compare the information of all devices with the preset white list. The white list includes the information of the devices that are allowed to access; form to display information about the device.

[0049] Blacklist and whitelist can be set in advance, and the blacklist includes the information of devices that are prohibited from accessing. When a device in the blacklist tries to access the wireless router, the monitoring device for the illegal access device can automatically prevent the access of the illegal device. In this way, the user does not need t...

Embodiment 3

[0054] The third embodiment further describes the monitoring method for illegal access devices in the first embodiment.

[0055] Wherein, step 101 includes:

[0056] When it is recognized that a new device is connected to the wireless router, the address resolution list preset in the new device is queried, and at least one of the IP address of the device, the MAC address of the device and the user name of the device is obtained from the address resolution list.

[0057] Step 102 includes:

[0058] Comparing the information of the new device with the preset white list, the white list includes the information of the devices that are allowed to be accessed; when the information of the new device is not recognized in the white list of the devices that are allowed to be accessed, the new device is displayed on the display module Information.

[0059] Blacklist and whitelist can be set in advance, and the blacklist includes the information of devices that are prohibited from acces...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for monitoring an illegal access device and an apparatus thereof. The method comprises the following steps: querying equipment access situation of a wireless router and acquiring information of the equipment accessed to the wireless router; displaying the information of the equipment so as to acquire the information of the illegal access device. By using the method for monitoring the illegal access device and the apparatus thereof, through displaying the equipment accessed to the wireless router, a user can conveniently know which users access the wireless router equipment and can determine which equipment is illegal. Operations of forbidding the illegal access equipment and the like can be performed. The user, who does not have strong professional knowledge, can discover the illegal access equipment. Therefore, the needs of most people can be satisfied.

Description

technical field [0001] The invention relates to network technology, in particular to a monitoring method and device for illegal access equipment. Background technique [0002] With the development of mobile Internet, wireless access devices are rapidly popularized in enterprises and families, which provide extensive network coverage and bring great convenience to users. However, due to the over-the-air characteristics of wireless access, device information and network resources are easily stolen. Among them, the "crashing network phenomenon" is to use the security loopholes of wireless access devices to crack the passwords of wireless access devices, so that illegal devices can enter the wireless network of legal wireless access devices without paying fees, and steal their network resources. Enjoy Internet service. [0003] In the prior art, users can use the method of encrypting the account of the wireless access device to prevent the phenomenon of network scraping, but t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W24/00H04W12/122
Inventor 马铮白晓媛王健全周光涛
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products