Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for wireless network access security management and control

A wireless network, security control technology, applied in wireless communication, transmission system, security device, etc., can solve the problem of unable to shield and filter mobile terminal access to the Internet, etc.

Active Publication Date: 2019-03-19
SHENZHEN RONGTENG SCI & TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing Wi-Fi security control methods can only passively monitor the communication data between mobile terminals and wireless access devices, but cannot selectively shield and filter mobile terminals accessing the Internet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for wireless network access security management and control
  • Method and system for wireless network access security management and control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Please refer to figure 1 , a preferred embodiment of a wireless network access security management and control system in the present invention includes a first wireless access device 100 , a wireless network management and control unit 200 and a terminal device 300 . The wireless network management and control unit 200 includes a second wireless access device 210 and a third wireless access device 220 . The terminal device 300 can perform wireless communication with the first wireless access device 100 , the second wireless access device 210 and the third wireless access device 220 respectively through several communication links. The first wireless access device 100 and the third wireless access device 220 are respectively connected to the Internet 400 through optical fiber broadband.

[0020] Wherein, the first wireless access device 100 may be a public wireless router.

[0021] Wherein, the second wireless access device 210 may be a monitoring wireless router, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A wireless network access security control method, comprising the following steps: sending an access request to a first wireless access device through a terminal device; monitoring the connection between the terminal device and the first wireless access device through a second wireless access device communication information to obtain information about the first wireless access device and the terminal device; the second wireless access device judges whether the terminal device is a device that allows access, if the terminal device is not a device that allows access, the second wireless access device The access device sends an access denial message to the terminal device; the terminal device sends an access request to the third wireless access device; the third wireless access device judges whether the terminal device is a device that allows access, if the terminal device is a device that allows access The third wireless access device allows the terminal device to access the Internet and monitors the online behavior of the terminal device. The invention also discloses a wireless network access security control system.

Description

technical field [0001] The invention relates to a wireless network access security management and control method and system. Background technique [0002] At present, smartphones have become the carrier of various information for users, storing a large amount of important information. With the rapid development of wireless network (Wireless-Fidelity, Wi-Fi) technology, smart phones have also become the preferred targets of malicious attacks. A large part of the security threats of smart phones comes from leaks related to personal privacy and various malicious chargeback software. These malware take advantage of the loopholes in the previous permission mechanism to abuse permissions to attack mobile phones, and what's more, they call hardware in the background to spy on privacy. The existing Wi-Fi security control methods can only passively monitor the communication data between the mobile terminal and the wireless access device, but cannot selectively shield and filter the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/06H04W12/08
CPCH04L63/0876H04L63/10H04W12/06H04W12/08
Inventor 郭胜马文驷
Owner SHENZHEN RONGTENG SCI & TECH CO LTD