Method for automatically registering wireless terminal by utilizing physical characteristics

A wireless terminal, automatic registration technology, applied in wireless communication, network data management, electrical components and other directions, can solve the problems of administrator input workload, difficult operation, endangering internal information security, etc., to achieve strong security reliability, simplification Registration process, the effect of low professional requirements

Active Publication Date: 2012-07-11
GUANGDONG SHENGLU TELECOMM TECH +1
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the password authentication method is that the administrator sets a password on the WiFi AP, and the user's client can enter the internal network by entering the password when accessing the wireless network. The disadvantage of this method is that the user needs to remember the password, which is inconvenient to use. ; In addition, once the password is leaked, illegal users can easily enter the internal network, endangering internal information security
The disadvantage of this method is that when the number of wireless terminals is large, the input workload of the administrator is heavy, and the daily management is difficult; , which is difficult to operate and inconvenient to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] Automatic registration of endpoints using physical characteristics of signal strength:

[0024] Set the signal strength threshold RSSI_threshold in the WiFi AP;

[0025] The wireless terminal sends a message to the WiFi AP during the process of requesting network access. After receiving the message, the WiFi AP measures the signal strength (RSSI_rx) of the wireless terminal;

[0026] If RSSI_rx > RSSI_threshold, it is judged that the terminal is a legal user; otherwise, it is an illegal user;

[0027] The MAC address of the legal terminal is added to the legal MAC address database to complete the registration process.

Embodiment 2

[0029] Use the physical characteristics of the incident angle of the terminal signal to automatically register the terminal:

[0030] Set the range rx_angle_min and rx_angle_max of the incident angle of the terminal signal in the WiFi AP;

[0031] The wireless terminal will send a message in the process of requesting network access. After the WiFi AP receives the signal, it measures the physical characteristic rx_angle of the incident angle of the signal;

[0032] If the incident angle rx_angle of the wireless terminal signal satisfies the following formula rx_angle_min < angle_rx < angle_max, then it is judged that the terminal is a legitimate user; otherwise, it is an illegal user;

[0033] The MAC address of the legal terminal is added to the legal MAC address database to complete the registration process.

Embodiment 3

[0035] Use the physical characteristics of the user terminal location to automatically register the terminal: the location information of the user terminal can be the distance between the user terminal and the AP, or the longitude / latitude information of the user terminal;

[0036] (1) Preset the range of user location in WiFi AP;

[0037] (2) During the process of requesting network access, the wireless terminal actively sends its own location information to the AP, and the location information of the wireless terminal can be obtained by GPS and other methods;

[0038] (3) The WiFi AP extracts the location information of the wireless terminal;

[0039] (4) If the extracted location information of the wireless terminal satisfies the preset location range, it is judged that the terminal is a legal user, otherwise it is an illegal user;

[0040] (5) Add the MAC address of the legal terminal to the legal MAC address database to complete the registration process.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for automatically registering a wireless terminal by utilizing physical characteristics, which is characterized in that the wireless terminal is automatically registered by utilizing the physical characteristics containing received signal strength indication (RSSI), signal quality carrier to interference plus noise ratio / signal to interference plus noise ratio (CINR / SINR), timing offset, frequency offset, a user terminal position, a terminal signal incident angle and a wireless fidelity media access control (MAC) address to serve as authentication conditions. According to the method for automatically registering the wireless terminal by utilizing the physical characteristics, a wireless user is registered by a simple step, thereby, the use complexity is reduced, and the information safety of the user is ensured. The method for automatically registering the wireless terminal by utilizing the physical characteristics has good popularization value.

Description

technical field [0001] The invention relates to the technical field of wireless communication, in particular to an automatic registration method of a wireless terminal. Background technique [0002] With the continuous development of wireless communication, wireless devices have been widely used in people's lives, and the number is also very large. While wireless devices bring convenience to our work and life, there are also potential safety hazards. For example, for an enterprise, users can access the wired LAN only when they enter the company, but the situation of the wireless network is not the case. As long as the wireless network covers any place, the wireless terminal can access the company's internal network, that is to say, the user As long as you enter the area covered by the wireless network, you can connect to the company's internal network, which may directly endanger the company's internal information security. [0003] At present, the methods to solve the pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/02H04W12/06H04W60/00
Inventor 傅瑞锦杨华胡泽伟林家金邹治锋
Owner GUANGDONG SHENGLU TELECOMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products