Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless network safe access method, apparatus and system

A secure access and wireless network technology, applied in the field of wireless network secure access methods, devices and systems, can solve the problems of encryption method cracking, complicated operation process, encryption method easy to leak, etc., to achieve security protection and convenient use Effect

Active Publication Date: 2014-04-09
ZTE CORP
View PDF4 Cites 62 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, due to the open characteristics of wireless LAN channels, any of the above encryption methods has certain defects. For example, when enough data packets are obtained, the encryption method will be cracked; through SSID scanning software, hidden SSIDs can be found, etc. Wait
It can be seen that whether it is the WEP, WPA, WPA2 encryption methods proposed by IEEE, or the WPS encryption method proposed by the Wi-Fi Alliance, or the solution proposed by the patented technology, there are problems such as complicated operation process and easy leakage of encryption methods and other problems. defect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless network safe access method, apparatus and system
  • Wireless network safe access method, apparatus and system
  • Wireless network safe access method, apparatus and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0034] In order to solve the problems in the prior art that the wireless network access operation process is complicated and the encryption method is easy to be leaked, the embodiments of the present invention provide a wireless network secure access method, device and system. The present invention is applicable to any user, preferably, it is applicable to enterprise users with many users accessing the WLAN network.

[0035] The technical scheme of the present...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless network safe access method, apparatus and system. The method comprises the following steps: an access point (AP) receiving a detection request frame sent by a station (STA), and obtaining a user name, a user password, and the MAC address of the STA which are carried by the detection request frame; and the AP scheduling a white list configured in advance, utilizing the white list to detect whether the user name, the user password and the MAC address of the STA are valid, and feeding a detection request response frame carrying an encryption mode and secret key information back to the STA when detection results are valid. Through the access method provided by the invention, it is not necessary for a user to carry out complex configuration, be aware of which encryption algorithm is adopted by the AP and input a complex WLAN password so that the use of the user is facilitated; and besides, the white list is arranged for detecting the validity of the access user in a binding mode, so that safety of a wireless network can be effectively protected.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a wireless network security access method, device and system. Background technique [0002] WLAN (Wireless Local Area Network, wireless local area network) technology is one of the hotspots in today's communication field. Compared with wired, the start-up and implementation of wireless local area network is relatively simple, and the maintenance cost is low. Generally, only one or more access point devices need to be placed A local area network covering the entire building or area can be established. In a typical wireless network system, STA (Station, station) refers to a terminal such as a PC or a portable notebook computer with a wireless network card, and an AP (Access Point, access point) provides a bridge function from a wireless client to a LAN. Wireless-to-wired and wired-to-wireless frame conversion is performed between the wireless client and the wireless...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/08
Inventor 潘万鹏朱剑英
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products