Method and device for wireless terminal identifying pseudo-wifi network

A wireless terminal and network technology, applied in the field of wireless networks, can solve problems such as inability to identify, and achieve the effect of reducing misjudgments and missed judgments

Active Publication Date: 2020-02-11
ALIBABA GRP HLDG LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Attack-type pseudo WiFi is to force the user to switch to a pseudo WiFi line through attack behavior after the user has connected to a real WiFi network, which cannot be identified by existing technical solutions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for wireless terminal identifying pseudo-wifi network
  • Method and device for wireless terminal identifying pseudo-wifi network
  • Method and device for wireless terminal identifying pseudo-wifi network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In the following description, many technical details are proposed in order to enable readers to better understand the application. However, those skilled in the art can understand that without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in each claim of the present application can be realized.

[0030] In order to make the purpose, technical solution and advantages of the present invention clearer, the following will further describe the implementation of the present invention in detail in conjunction with the accompanying drawings.

[0031] The first embodiment of the present invention relates to a method for a wireless terminal to identify a pseudo-WiFi network, including the following steps:

[0032] Monitor whether there is a four-way handshake packet in the current network communication data packet. If there is a four-way handshake packet, perform at least one or a combin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of wireless networks, and discloses a method and a device for a wireless terminal to identify a pseudo-WiFi network. In the present invention, the following steps are included: monitoring whether there is a four-way handshake packet in the current network communication data packet; if there is a four-way handshake packet, at least perform one of the following steps or a combination thereof: Step A, judge the four-way handshake packet Whether the handshake information in is consistent with the handshake information used when accessing the WiFi network last time, if not, it is determined that the current WiFi network has the risk of belonging to a pseudo WiFi network; step B, after accessing the WiFi network, obtain the specified IP The first route of the address is to determine whether the first route is consistent with the second route to the specified IP address when accessing the WiFi network last time, and if not, it is determined that the current WiFi network has a risk of belonging to a pseudo WiFi network. A more accurate identification method is given for pseudo-WiFi networks to reduce misjudgments and missed judgments.

Description

technical field [0001] The invention relates to the field of wireless networks, in particular to a technology for a wireless terminal to identify a pseudo-WiFi network. Background technique [0002] In a wired network, the data packets are delivered to the target node on the physical link. Usually, the data may be leaked only when the physical link is directly connected to the physical link or the physical link is damaged. Malicious behavior is possible. In a wireless network, data is transmitted through wireless electromagnetic waves, and no specific propagation medium is required. As long as the terminal nodes are within the coverage of radio waves, the terminal nodes can receive wireless signals to obtain data. Therefore, data leakage and malicious behavior are more likely to occur. . The principle of fake WiFi is to build a false network access point (AccessPoint, referred to as "AP") controlled by the attacker, attracting users to connect to the AP, so that all data t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/12H04L29/06H04W12/122
Inventor 肖鹏
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products