Method and device for recognizing pseudo WiFi network by wireless terminal

A wireless terminal and network technology, applied in the field of wireless networks, can solve problems such as inability to identify, and achieve the effect of reducing misjudgments and missed judgments

Active Publication Date: 2016-05-25
ALIBABA GRP HLDG LTD
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Attack-type pseudo WiFi is to force the user to switch to a pseudo WiFi line through attack behavior after

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for recognizing pseudo WiFi network by wireless terminal
  • Method and device for recognizing pseudo WiFi network by wireless terminal
  • Method and device for recognizing pseudo WiFi network by wireless terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In the following description, many technical details are proposed in order to enable readers to better understand the application. However, those skilled in the art can understand that without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in each claim of the present application can be realized.

[0030] In order to make the purpose, technical solution and advantages of the present invention clearer, the following will further describe the implementation of the present invention in detail in conjunction with the accompanying drawings.

[0031] The first embodiment of the present invention relates to a method for a wireless terminal to identify a pseudo-WiFi network, including the following steps:

[0032] Monitor whether there is a four-way handshake packet in the current network communication data packet. If there is a four-way handshake packet, perform at least one or a combin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the wireless network field, and discloses a method and a device for recognizing a pseudo WiFi network by a wireless terminal. The method comprises the following steps: whether four handshake packets appear in the current network communication data packet is monitored; if yes, at least one following step or a step combination is executed: A, whether the handshake information in the four handshake packets is consistent with the handshake information used when the WiFi network is accessed last time, if not consistent, the current WiFi network is determined to have a risk of belonging to a pseudo WiFi network; and B, after the WiFi network is accessed, a first route arriving at a specified IP address is acquired, whether the first route is consistent with a second route arriving at the specified IP address when the WiFi network is accessed last time is judged, and if not consistent, the current WiFi network is determined to have a risk of belonging to a pseudo WiFi network. A more precise recognition method is given to the pseudo WiFi network, and error judgment and missed judgment can be reduced.

Description

technical field [0001] The invention relates to the field of wireless networks, in particular to a technology for a wireless terminal to identify a pseudo-WiFi network. Background technique [0002] In a wired network, the data packets are delivered to the target node on the physical link. Usually, the data may be leaked only when the physical link is directly connected to the physical link or the physical link is damaged. Malicious behavior is possible. In a wireless network, data is transmitted through wireless electromagnetic waves, and no specific propagation medium is required. As long as the terminal nodes are within the coverage of radio waves, the terminal nodes can receive wireless signals to obtain data. Therefore, data leakage and malicious behavior are more likely to occur. . The principle of fake WiFi is to build a false network access point (AccessPoint, referred to as "AP") controlled by the attacker, attracting users to connect to the AP, so that all data t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/12H04L29/06H04W12/122
Inventor 肖鹏
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products