Security protection method for PIN (Personal Identification Number) code access mode

A technology of PIN code and access method, which is applied in the field of security protection of PIN code access method, which can solve the problems of inconvenience for legitimate users, failure of legitimate users to log in normally, and not allow Registrar and Enrollee access, etc., to improve security Effect

Active Publication Date: 2012-08-01
SHENZHEN GONGJIN ELECTRONICS CO LTD
View PDF2 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to make up for this defect, the Wi-Fi Alliance has stipulated in "Wi-Fi Simple Configuration Technical Specification Version 2.0.2" that when the AP receives the wrong PIN code 10 times in a row, it will enter the lock state. In this state, any Registrar is not allowed to access, but Enrollee can still be accessed; some manufacturers do not allow any Registrar and Enrollee to access after entering the lock state
However, this will also cause legitimate users to be unable to log in to the AP normally, which will bring a lot of inconvenience to legitimate users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection method for PIN (Personal Identification Number) code access mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0025] Such as figure 1 As shown, in this embodiment, the security protection method of the PIN code access method specifically includes the following steps.

[0026] 101. A client uses a PIN code to access.

[0027] 102. Determine whether the client is in the blacklist, if it is in the blacklist, deny access, and return to AP Setup locked; if it is not in the blacklist, go to step 103.

[0028] 103. Determine whether the PIN code provided by the client is legal, if the PIN code is legal, verify OK, and allow access; if the PIN code is invalid, go to step 104.

[0029] 104. Record or update the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security protection method for a PIN (Personal Identification Number) code access mode. The security protection method includes the following steps: a blacklist is established and initialized to be empty; when a client end is detected to use a PIN code for access, whether the client end is in the blacklist is judged; if the client end is in the blacklist, then the access is denied; if the client end is not in the blacklist, then the next step is executed; whether the PIN code provided by the client end is valid is judged; if the PIN code is valid, then the access of the client end is allowed; if the PIN code is invalid, the access is denied, and the next step is executed; the information of the client end is recorded, and whether the client end meets preset blacklisting conditions is judged; if the client end meets the preset blacklisting conditions, then the client end is added into the blacklist; and if the client end does not meet the preset blacklisting conditions, the client end waits for the next connection. Since the blacklist mechanism is introduced into the security protection method, a certain client end can be added into the blacklist when the failure of the PIN code access of the client end meets the preset conditions, and thereby is locked, consequently, while the security protection method can ensure that the accesses of normal client ends can be normal, all malicious attackers can be locked, and thereby the security of WPS (Wi-Fi Protected Setup) is further enhanced.

Description

technical field [0001] The present invention relates to the technical field of WPS (Wi-Fi Protected Setup, Wi-Fi protection device), in particular to a security protection method of a PIN code access mode. Background technique [0002] With the rapid development of wireless broadband Internet access services, wireless access devices such as wireless home gateways are developing rapidly. In order to meet business needs and simplify user configuration, the WPS standard formulated by the Wi-Fi Alliance is mainly dedicated to simplifying the installation and security performance configuration of wireless LANs. WPS can help users automatically configure the network name SSID (Service Set Identifier, service set identifier), configure WPA (Wi-Fi Protected Access, Wi-Fi network security access) data encoding and authentication functions, users only need to enter the personal information code PIN (Personal Identification Number, personal identification number), which greatly simpl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/08H04W12/122
Inventor 闫瑞轩王金桂
Owner SHENZHEN GONGJIN ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products