Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method for performing identity recognition at WIFI (Wireless Fidelity) scanning stage

An authentication method and identification technology, which are applied in the authentication field of identification in the WIFI scanning phase, and can solve the problems of not introducing an authentication mechanism and STA distinction.

Inactive Publication Date: 2015-12-23
SHANGHAI SIFLOWER COMM TECH CO LTD
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In view of the above problems, the present invention provides an authentication method for identity recognition in the WIFI scanning phase, which is used to supplement the existing WIFI protocol specification, to solve the problem that the technology defined in the WIFI specification does not introduce an identity verification mechanism in the scanning phase in the prior art, and does not The problem of distinguishing between specific STAs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method for performing identity recognition at WIFI (Wireless Fidelity) scanning stage
  • Authentication method for performing identity recognition at WIFI (Wireless Fidelity) scanning stage
  • Authentication method for performing identity recognition at WIFI (Wireless Fidelity) scanning stage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The core idea of ​​the present invention is: introduce an identity authentication mechanism in the WIFI scanning stage, so that only legal users can scan the target AP, and users who are identified as illegal will be blocked if they subsequently initiate connection requests.

[0031] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, but not as a limitation of the present invention.

[0032] Such as figure 1 As shown, a kind of WIFI scanning stage of the present invention carries out the authentication method of identification, mainly comprises the following steps:

[0033] Step 1: When the AP broadcasts a beacon (Beacon) frame, set the SSID field of the Beacon frame broadcast by the AP to be empty, so that all STA users cannot scan the AP in the passive scanning mode; then the STA switches to the active scanning mode , to search the network by sending a ProbeReq (ProbeReq) management frame.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of wireless network communication, in particular to an authentication method for performing identity recognition at a WIFI (Wireless Fidelity) scanning stage. Identity authentication is introduced at the WIFI scanning stage, wherein identity recognition management can be realized on an application layer, and is open to user configuration. Through the user configuration, the identity of a scanning request sender can be distinguished at the scanning stage. If the scanning request sender is a valid user, a target AP (Access Point) can be scanned normally and displayed in a scanning list of the target AP, and a subsequent connection flow is kept constant. If the scanning request sender is an invalid user, the target AP cannot be scanned, and an invalid connection request of the invalid user is blocked at the same time.

Description

technical field [0001] The invention relates to the technical field of wireless network communication, in particular to an authentication method for identity recognition in the WIFI scanning stage. Background technique [0002] In the existing WIFI technical specification, the access of the device is divided into two independent stages of scanning and connection. The mainstream authentication methods PSK (pre-shared password method) and Enterprise (based on IEEE802.1X specification) authentication process are all carried out in the connection stage, and no identity verification is defined in the scanning stage. [0003] There are two scanning methods defined in the existing WIFI technical specification: [0004] 1. Scanning in active mode. STAs broadcast ProbeReq management frames on each channel to search the network. After AP receives them, it will not distinguish which STA sent them, and will reply ProbeRsp management frames uniformly. The STA updates the scanned AP lis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W48/16
CPCH04W12/06H04W48/16
Inventor 冯磊李兴仁王胜
Owner SHANGHAI SIFLOWER COMM TECH CO LTD