Access point (AP) and method for securely connecting wireless workstation (STA) with AP

A wireless workstation and secure connection technology, applied in security devices, access restrictions, connection management, etc., can solve the problems of hidden dangers in the network and the inability to distinguish between legitimate users and illegal users, and achieve the effect of ensuring secure connections

Inactive Publication Date: 2012-05-16
ZTE CORP
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The access point cannot distinguish whether the workstation accessed through wps i

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access point (AP) and method for securely connecting wireless workstation (STA) with AP
  • Access point (AP) and method for securely connecting wireless workstation (STA) with AP
  • Access point (AP) and method for securely connecting wireless workstation (STA) with AP

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0033] The present invention provides the following technical solutions:

[0034] During the WPS connection process, when the AP opens the WPS connection, it starts timing, and does not perform the WPS connection within the timing time. After the timing time is reached, if it is detected that there are two or more STAs within the timing time ( Workstation) when the WPS connection is turned on, the WPS connection process will be terminated.

[0035] After the timing time is reached, if it is detected that only one STA has opened the WPS connection within the timing time, the STA is allowed to perform the WPS connection, that is, the WPS connection is completed with the STA.

[0036] Preferably, the AP also sends an alarm when terminating the current WPS connection process.

[0037] The timing time is a delay time preset on the AP, preferably greater than or equal to 30 seconds and less than or equal to 60 seconds.

[0038] During this time interval, the AP still replies to a probe respo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access point (AP) and a method for securely connecting a wireless workstation (STA) with the AP, which can enable a user to conveniently and fast access a network by utilizing WPS (Wi-Fi Protected Setup) and can simultaneously ensure the security of the wireless network. The method comprises the following steps of: during the process of connecting the WPS, starting to timing when the AP turns on WPS connection; doing not carry out the WPS connection within the timing time; and after reaching the timing time, stopping the process of connecting the WPS if the condition that two or more STAs turn on the WPS connection within the timing time is detected.

Description

technical field [0001] The invention relates to the field of wireless local area networks, in particular to an access point and a method for securely connecting a wireless workstation to the access point. Background technique [0002] At present, wireless local area network technology is widely used in home networks. Users connect computers to access points in home networks through wireless workstations, replacing traditional wired connections, which saves the trouble of wiring and is very convenient to use. Due to the openness of the wireless network, any access point can be connected to the cable network without encryption in the wireless network, which brings great security risks to users. However, setting an encryption method for the wireless network has brought a certain threshold to ordinary users who do not have wireless professional knowledge. In the traditional way, when creating a secure wireless network, users need to manually set the network name (SSID) and secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/08H04W84/12
CPCH04W76/02H04W12/08H04W48/20H04W84/12H04W76/10
Inventor 侯书朋马涛李迎新刘昕颖
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products