Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method based on wireless signal intensity

A technology of wireless signal strength and authentication method, applied in wireless communication, electrical components, security devices, etc., can solve the problems of cumbersome encryption operation, poor convenience, poor security, etc., and achieve the effect of good security

Active Publication Date: 2015-04-22
深圳市鑫博创科技有限公司
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Wired Equivalent Privacy (WEP) was found to have serious security problems in 2001: when there is a user connection, the encryption key can be obtained within an acceptable time
[0008] WPA and WPA2 encryption authentication mechanism solves the security problem of wired equivalent encryption, but its encryption operation is cumbersome and the convenience is relatively poor
[0009] Wi-Fi Protected Setup (WPS) is a wireless security standard proposed by the Wi-Fi Alliance to improve the convenience of WPA and WPA2, but this standard was found to have serious security problems in 2011: in the wireless signal Under acceptable circumstances, it only takes one day to get the encrypted key
[0010] Keyless open network mechanism, keyless open network mechanism with mobile communication device short message authentication mechanism, Wired Equivalent Privacy (WEP) encryption authentication mechanism, WPA encryption authentication mechanism, WPA2 encryption authentication mechanism and Wi-Fi protection settings (WPS) encryption authentication mechanism has the problem of poor convenience or poor security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method based on wireless signal intensity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0031] Any feature disclosed in this specification (including any appended claims, abstract and drawings), unless expressly stated otherwise, may be replaced by alternative features which are equivalent or serve a similar purpose. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0032] Such as figure 1 , a kind of authentication method based on wireless signal strength of the present invention, at first, wireless router waits for user's wireless device connection, after user's wireless device connects successfully, pops up a page prompting user to approach authentication device, namely this wireless router; Start reading The wireless signal strength of the connected wireless device, that is, the received signal stren...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method based on wireless signal intensity. The wireless signal intensity of wireless network equipment is read, whether the wireless signal intensity reaches a set threshold value or not is judged, the equipment is authenticated when the wireless signal intensity reaches the threshold value, and the wireless signal intensity continues being read and judged if the wireless signal intensity does not reach the threshold value; in addition, the threshold value can be corrected according to the network equipment of different kinds, and the method is more flexible and more convenient to implement. By the adoption of the technical scheme, the method can be combined with a secret-key-free open network mechanism, cooperation of the secret-key-free open network mechanism and a mobile communication equipment short message authentication mechanism, a WEP encryption authentication mechanism, a WPA encryption authentication mechanism, a WPA2 encryption authentication mechanism and a WPS encryption authentication mechanism, and is an effective measure for further enhancing safety.

Description

technical field [0001] The invention relates to an authentication method based on wireless signal strength. Background technique [0002] The general standard for wireless networks in the world today is the IEEE 802.11 wireless network communication standard defined by the Institute of Electrical and Electronics Engineers (IEEE) in 1997 and related supplementary standards released thereafter. The IEEE 802.11 standard provided a keyless open network mechanism and an authentication mechanism for Wired Equivalent Privacy (WEP) in the early days. However, due to serious security problems in wired equivalent encryption, the IEEE 802.11 standard added encryption authentication mechanisms called "WPA" and "WPA2" by the market in the IEEE 802.11i standard supplemented in 2004. Although the Institute of Electrical and Electronics Engineers developed the IEEE 802.11 standard, it is a commercial alliance called the Wi-Fi Alliance that is driving this standard to the market. [0003] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06
CPCH04W12/06
Inventor 贺湘平郭国秋黄杰
Owner 深圳市鑫博创科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products