Method and device for wireless access authentication

A wireless access and access authentication technology, applied in security devices, wireless communication, connection management, etc., can solve problems such as inconvenience, inability to guarantee user interests, and impact on the security of WIFI equipment, and achieve the effect of preventing cracking

Inactive Publication Date: 2013-08-14
GLOBAL INNOVATION AGGREGATORS LLC
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of wireless communication, wireless fidelity (WIFI for short) technology is becoming more and more common, and the security of WIFI access point access key has also become a research topic for technicians. The initial keys are factory-set or the manufacturer provides a completely random serial number for the default key of the WIFI access point, and the general user will not modify these factory

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for wireless access authentication
  • Method and device for wireless access authentication
  • Method and device for wireless access authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0023] In the wireless access authentication method provided by the embodiment of the present invention, under normal circumstances, the execution subject of this method is a gateway, and the gateway is used to provide protocol conversion and routing when intercommunicating between networks using different architectures or protocols. Facilities for network compatible functions such as selection, data exchange, etc. When a device transmits data through the gate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method and device for wireless access authentication, which relate to the field of wireless communication and can be used for preventing a secret key from being broken. The method comprises the following steps: the frequency of consecutive failures in access of first user equipment to gateway device is counted and recorded after that feature characters of the first user equipment are not prestored in the gateway device and the first user equipment fails to use a secret key for the first time to try to access the gateway device are judged; if the frequency is larger than a pre-arranged first threshold value, a new secret key can be generated, and WiFi access authentication is performed on user equipment of the gateway device of which the feature characters are prestored through the new secret key; and the embodiment of the invention is used for wireless access authentication.

Description

technical field [0001] The present invention relates to the field of wireless communication, in particular to a method and device for wireless access authentication. Background technique [0002] With the development of wireless communication, wireless fidelity (WIFI for short) technology is becoming more and more common, and the security of WIFI access point access key has also become a research topic for technicians. The initial keys are factory-set or the manufacturer provides a completely random serial number for the default key of the WIFI access point, and the general user will not modify these factory settings, and these keys are immutable, users always With this key, as long as the hacker discovers the rules or attacks the WIFI access point by traversal, it will have a great impact on the security of the WIFI device. In this way, the normal use of the WIFI device by the user cannot be guaranteed, and If the hacker is connected to the WIFI device, the interests of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W12/06H04W76/02H04W12/069
CPCH04W12/08H04W84/12H04W12/04H04W12/12H04W12/041H04W12/122
Inventor 张凯
Owner GLOBAL INNOVATION AGGREGATORS LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products