Method and system for encrypting, hiding and discovering of WIFI access point

An access point and access point information technology, applied in the field of communication, can solve the problems affecting network use effect and data security, AP password cracking and misappropriation, etc., and achieve the effect of reducing the risk of misappropriation

Active Publication Date: 2015-11-04
TCL CORPORATION
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this case, if an illegal user captures the management frame interacted between the STA and the AP through a network analysis sniffer based on the principle of passive listening, it can still obtain the relevant information of the AP, and can further send a non- The broadcast probe request frame exposes the AP to the control of the illegal user, so that the AP password is cracked and stolen, and ultimately affects the use of the network by the AP owner itself and data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for encrypting, hiding and discovering of WIFI access point
  • Method and system for encrypting, hiding and discovering of WIFI access point
  • Method and system for encrypting, hiding and discovering of WIFI access point

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention provides a method and system for encrypting, hiding and discovering WIFI access points. In order to make the purpose, technical solution and effect of the present invention clearer and clearer, the present invention will be further described in detail below. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0035] Such as figure 1 The method for hiding and discovering a kind of WIFI access point encryption, wherein, said method comprises the following steps:

[0036] S100. Pre-generate a first public key and a first private key of an asymmetric encryption algorithm, set the first public key in a WIFI access point, and set the first private key in the WIFI terminal.

[0037] Preferably, a "public key key setting" edit box can be added on the setting page of the AP (that is, the WIFI access point), through which the setting of the first public ke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for encrypting, hiding and discovering of a WIFI access point. The method comprises steps of generating a first public key and a first private key, wherein the first public key is positioned in an AP, and placing the first private key in an STA, B generating a second public key and a second private key, wherein the second public key is added into a management frame, and utilizing the first public key to encrypt the frame body which is transmitted to the STA, C using the first private key to decrypt the encryption to find the AP by the STA and storing the second public key, D using the second public key to transmit the following-up management frame to the AP by the STA, using the second private key to perform decryption on the following-up management frame by the AP, using the first public key to transmit the following- up management frame to the STA by the AP, and using the first private key to perform decryption on the received following-up management frame by the STA. The invention utilizes the asymmetric encryption algorithm to perform encryption on the STA and the AP management frame, only the STA has the correct private key to decrypt the management frame and find the existence of the AP so as to hide the visibility of the AP toward the illegal user and thus reduce the risk that the AP can be stolen.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and system for encrypting and hiding and discovering WIFI access points. Background technique [0002] With the development of network technology, WIFI (wireless network) technology has been widely used in various electronic devices, and WIFI terminal (STA) depends on WIFI access point (AP) to access the network. Currently used APs usually achieve the purpose of hiding APs by not sending beacon frames (beacon frames) and not responding to broadcast probe request frames (probe request frames). However, in this case, if an illegal user grabs the management frame interacted between the STA and the AP through a network analysis sniffer based on the principle of passive listening, it can still obtain the relevant information of the AP, and can further send a non- The broadcast probe request frame exposes the AP to the control of the illegal user, thus causing the AP password to be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/03H04W12/041H04W12/0431
Inventor 曾永莹
Owner TCL CORPORATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products