Method for protecting wireless network

A wireless network and wireless access technology, applied in network topology, wireless communication, security devices, etc., can solve problems such as security risks, leaking wireless access points, etc., to achieve the effect of protection, avoidance of leakage, and risk reduction

Active Publication Date: 2013-12-11
FUZHOU ROCKCHIP SEMICON
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] When the wireless access point broadcasts the beacon frame and replies to the probe response

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting wireless network
  • Method for protecting wireless network
  • Method for protecting wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Such as Figure 1 to Figure 3 As shown, the preferred embodiments of the present invention will be described in detail next.

[0026] The working modes of the WIFI module include STA working mode and AP working mode. The STA in the STA working mode is the abbreviation of station. In the STA working mode, the WIFI module can scan and connect to the wireless access point to realize the Internet access function. The AP in the AP working mode is the abbreviation of Access point (wireless hotspot or wireless access point). In the AP working mode, the WIFI module can be used as a wireless access point to realize the routing function.

[0027] The method of the present invention can be implemented on devices such as routing devices with WIFI modules, computers or mobile smart devices. The preferred embodiment of the present invention uses a mobile smart device for detailed description. Now a mobile smart device is basically equipped with a mobile communication module and a W...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for protecting a wireless network. The method for protecting the wireless network comprises the steps that a WIFI module is arranged in an STA working pattern, the WIFI module is used for scanning wireless access points around, and the beacon frame data packages of the wireless access points are obtained; one beacon frame data package is selected from the beacon frame data packages of the wireless access points around, and physical address and service set identification information are extracted from the beacon frame data package; the WIFI module is switched to an AP working pattern, the WIFI module is used for broadcasting the beacon frame, and the physical address and the service set identification information of the beacon frame are the extracted physical address and the extracted service set identification information. According to the method for protecting the wireless network, the physical addresses and the service set identification information of other equipment are used for achieving the purpose that the self information of the WIFI module is not broadcasted, self information leakage of the WIF module is prevented, and the protection of the wireless network is achieved.

Description

technical field [0001] The invention relates to a method of protecting a wireless network. Background technique [0002] Wireless network (that is, WIFI network) With the popularization of smart devices such as mobile phones and tablets, the coverage of wireless networks is also increasing. The normal wireless network workflow is as follows: wireless routers are connected to the network through wired or wireless methods. Then the WIFI module on the wireless router transmits the wireless signal as a wireless access point. Smart devices such as mobile phones scan the wireless access point through the built-in WIFI module, and then they can connect to the wireless access point. If the wireless access point is encrypted, the mobile phone needs to enter the password to connect. [0003] Specifically, according to the IEEE-802.11 protocol specification, when the wireless access point is broadcasting, it must first broadcast a beacon frame (beacon frame). The beacon frame is a dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/00H04W84/12H04W48/16
Inventor 林涛
Owner FUZHOU ROCKCHIP SEMICON
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products