Method for carrying out access authentication through monitoring client spectrum field intensity

An access authentication and client technology, applied in wireless communication, electrical components, security devices, etc., can solve the problem of decreased security of access points, failure of authorization of access points, increased client functional requirements and operational complexity, etc. problems, to achieve the effect of good user access experience and low requirements for authorized access

Inactive Publication Date: 2016-05-18
GUANGDONG SHUNDE ZHONGKA CLOUD NETWORK TECH CO LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] When a client accesses a wireless access point that requires authorized access, the client generally needs to provide a password to access, but when the password is artificially leaked or shared, the authorization of the access point will become invalid, making the access point points of security drop
[0003

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for carrying out access authentication through monitoring client spectrum field intensity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The present invention will be further described below in conjunction with the accompanying drawings, but the embodiments of the present invention are not limited thereto.

[0015] The description of the present invention has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and changes will be apparent to those of ordinary skill in the art. The embodiment was chosen and described in order to better explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention and design various embodiments with various modifications as are suited to the particular use.

[0016] this invention figure 1 Describes the flow chart of the method for enabling the user to achieve wireless verification access by approaching the wireless access point through the spectrum sensing algorithm. Firs...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method for carrying out access authentication through monitoring client spectrum field intensity. The method comprises the following steps that: firstly, a client opens WLAN wireless access, searches the SSID of a wireless access point broadcast and initiates an association request, a wireless access point returns successful association information and records the MAC address of the client; and then the client approaches the wireless access point, the wireless access point automatically monitors the field intensity in a specified spectrum emitted by the client, when the spectrum field intensity reaches or exceeds a preset threshold, the wireless access point writes the MAC address of the client into a legitimate MAC address list, the authentication of the client is passed, and the normal Internet access is available. According to the method, the requirement of client authorized access is low, and the simple authorized Internet access of the client can be realized without the special function of the client.

Description

technical field [0001] The invention relates to the field of wireless technology, in particular to a method for performing access authentication by listening to the spectrum field strength of a client. Background technique [0002] When a client accesses a wireless access point that requires authorized access, the client generally needs to provide a password to access, but when the password is artificially leaked or shared, the authorization of the access point will become invalid, making the access point The security of the point is reduced. [0003] In the prior art, the authorization validity of the access point is generally ensured through fixed or dynamic passwords, coupled with MAC address restrictions, etc., but these methods increase the functional requirements and operational complexity of the client, and the user Configuration is required to take effect. Contents of the invention [0004] In order to overcome the shortcomings of the above-mentioned prior art, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W12/08
CPCH04W12/06H04W12/08
Inventor 邓博存谭彦
Owner GUANGDONG SHUNDE ZHONGKA CLOUD NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products