Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security method based on wireless firewall

A network security and firewall technology, applied in wireless communications, security devices, electrical components, etc., can solve the problems of not reaching the perfect state, not reaching the perfect level, etc., to improve the ability to resist hacker attacks, improve usability, and enhance usability Effect

Inactive Publication Date: 2012-03-14
周伯生
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, although these security standards provide important protection for the communication security of wireless networks, they are far from perfect, and they cannot reach the perfect state, which is determined by the complexity of network security mechanisms.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security method based on wireless firewall
  • Network security method based on wireless firewall

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] It is realized through a wireless firewall, mainly using wireless network intrusion detection and prevention technology. The wireless firewall function acts on the second layer of OSI, that is, MAC layer 25 (MAC layer is the data connection layer, OSI includes Wi-Fi wireless network card 23, driver program 24, MAC layer 25, network layer 26 and layers above the network layer), A new type of wireless firewall architecture, such as figure 1 As shown, the wireless firewall includes an intrusion detection and intrusion prevention module 11, a first frame hook (Frame Hook) 21 and a second frame hook 22, the intrusion detection and intrusion prevention module 11 is located in the user space 1 of the system, and the first frame hook 21 Connect the kernel space 2 (Kernel Space) of the operating system and the user space (User Space) 1, one end of the first frame hook 21 is in the wireless network card driver 24 of the operating system kernel space 2, and the other end of the fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network security method based on a wireless firewall. In the method, the wireless firewall acts on an MAC (Media Access Control) layer of OSI (Open System Interconnection) and comprises an intrusion detection and prevention module, a first frame hook and a second frame hook, wherein, the intrusion detection and prevention module is positioned in a user space of a system; the first frame hook is connected with a kernel space and the user space of the operating system, one end of the first frame hook is arranged in a wireless LAN (local area network) card driver in the kernel space of the operating system, the other end of the first frame hook is arranged in the user space and is connected with the intrusion detection and prevention module, the first frame hook transfers a frame received by the wireless LAN card driver to the intrusion detection and prevention module, and then the frame is sent back to the driver through the frame hook or is deleted after being processed by the module; and one end of the second frame hook is arranged in the wireless LAN card driver in the kernel space of the operating system, and the other end of the second frame hook is arranged in the user space and is connected with a frame encapsulation module. By adopting the network security method, the hacker attack resistance can be strengthened and the availability of the wireless network is improved.

Description

technical field [0001] The invention relates to a wireless network firewall system, in particular to a network security method based on a wireless firewall, which belongs to the technical field of Wi-Fi, and its system framework can also be applied to other wireless technologies, such as Zigbee and WiMAX. Background technique [0002] The eternal theme of network communication development is to enable people to obtain network resources freely, and security guarantee is the key element and necessary condition to realize this goal. The lack of security guarantee will inevitably lead to illegal operation of the network and then affect the security of upper layer communication content. With the gradual maturity of Wi-Fi technology, its price is quite cheap, and its potential application fields are very extensive. At present, the main reason hindering the application of Wi-Fi in key fields is security risks, and security has become the bottleneck of Wi-Fi development. In order ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/12H04W12/088H04W12/121
Inventor 周伯生
Owner 周伯生
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products