Method for preventing hot spot from being illegally simulated
A hot spot, illegal technology, applied in the field of preventing hot spot illegal impersonation, can solve the problems of hot spot impersonation, hot spot illegal impersonation, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] In order to describe in detail the technical content, structural features, achieved goals and effects of the technical solution, the following will be described in detail in conjunction with specific embodiments.
[0034] see figure 1 As shown, this embodiment provides a method for preventing illegal impersonation of hotspots, which can be applied to figure 1 In the system 100, it is applied between the client, the hotspot and the authentication server, and the client can be a mobile phone 101 or a notebook client. The hotspot 102 stores a unique first encryption method, which means it is different from other hotspots and can be uniquely associated with the identification information of the hotspot. The authentication server 103 stores the first decryption method corresponding to the first encryption method.
[0035] The method includes the following steps: the hotspot changes the ssid and password at regular intervals; the hotspot encrypts the ssid and password to ge...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 