Confidence leakage protection method and device

An illegal and legal technology, applied in the network field, can solve problems such as blocking normal connections

Active Publication Date: 2015-12-23
SHENZHEN SUNDRAY NETWORK SCI TECH
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Using the traditional anti-phishing AP method will also prevent the other company's terminal from connecting to the other company's AP normally, resulting in misjudgment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Confidence leakage protection method and device
  • Confidence leakage protection method and device
  • Confidence leakage protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The leakage prevention method provided by the embodiment of the present invention can be applied to such as figure 1 environment shown. refer to figure 1 As shown, the wireless controller 102 can centrally control multiple APs, such as one of the APs 104 , through a wired connection or a wireless connection. The wireless controller 102 includes a terminal feature library for storing terminal features. The wireless controller 102 can send information to the terminal, and can also receive data transmitted by the AP 104 and analyze the received data to obtain specific information. AP104 can listen to the association frame or data frame broadcast within its coverage when the terminal connects to other APs or itself, and can also listen to the wireless data transmitted between the terminal and the illegal AP when the terminal has successfully connected to the illegal AP In addition, the AP 104 can also send information to terminals and other APs. Wherein, the association ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a confidence leakage protection method, comprising steps of broadcasting related frame or data frames when a monitoring terminal is connected to an illegal AP, obtaining terminal characteristics of the terminal according to the related frame and the data frame, detecting whether the terminal characteristics exist in a preset terminal characteristic database, if yes, performing the leakage protection on the terminal. In leakage protection method, because the terminal characteristic database stores terminal characteristics of the terminal which is connected to the legal AP, so that the confidence leakage protection can be only applied on the terminal of the terminal characteristic database, and the confidence leakage protection is not performed on the terminal which is not in he terminal characteristic database without affecting the illegal connection with the AP by the terminal which is not in the terminal characteristic database. The invention does not affect the connection with the AP by the terminals of the other enterprise, and reduces the misjudgment.

Description

technical field [0001] The present invention relates to the field of network technology, in particular to a leak protection method and device. Background technique [0002] With the development of network technologies, enterprises or organizations often set up enterprise APs (wireless AccessPoints, wireless access points) internally. Enterprise employees connect to enterprise APs for office work. On the one hand, it reduces the enterprise's requirements for terminal network cable layout and makes employees' work spaces more open; on the other hand, it also facilitates employees to use BYOD (Bring Your Own Device, Bring Your Own Device) to work in enterprises Improve the production efficiency of the enterprise. [0003] However, due to the openness of the wireless space, there will be criminals simulating the same or similar WLAN (WirelessLocalAreaNetworks, wireless local area network) with the enterprise to establish a phishing AP. It is easy for employees to connect to ph...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08H04W12/12H04W12/37
CPCH04W12/08H04W12/12
Inventor 刘玉训
Owner SHENZHEN SUNDRAY NETWORK SCI TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products