Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for preventing hot spot from being illegally simulated

A hot spot, illegal technology, applied in the field of preventing hot spot illegal impersonation, can solve the problems of hot spot impersonation, hot spot illegal impersonation, etc.

Inactive Publication Date: 2016-08-24
郑建钦
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For this reason, it is necessary to provide a method to prevent hotspots from being impersonated illegally, and to solve the problem that existing hotspots are impersonated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing hot spot from being illegally simulated

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to describe in detail the technical content, structural features, achieved goals and effects of the technical solution, the following will be described in detail in conjunction with specific embodiments.

[0034] see figure 1 As shown, this embodiment provides a method for preventing illegal impersonation of hotspots, which can be applied to figure 1 In the system 100, it is applied between the client, the hotspot and the authentication server, and the client can be a mobile phone 101 or a notebook client. The hotspot 102 stores a unique first encryption method, which means it is different from other hotspots and can be uniquely associated with the identification information of the hotspot. The authentication server 103 stores the first decryption method corresponding to the first encryption method.

[0035] The method includes the following steps: the hotspot changes the ssid and password at regular intervals; the hotspot encrypts the ssid and password to ge...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for preventing a hot spot from being illegally simulated. The method comprises the steps of: scanning a two-dimensional code by a client, decrypting the two-dimensional code to obtain an ssid and a password of the hot spot, and prohibiting other applications from communicating with the client through a wifi (Wireless Fidelity) module connected with the client; establishing a connection with the hot spot by the client through the wifi module connected with the client; transmitting a random number to the hot spot by the client; and adopting a first encryption method to perform an encryption operation on the random number by the hot spot, thereby obtaining verification information. According to the technical scheme of the invention, through an authentication server, the uniqueness authentication of the hot spot can be realized, and the condition that an AP (Wireless Access Point) is phished can be avoided.

Description

technical field [0001] The invention relates to the technical field of hotspot management, in particular to a method for preventing illegal impersonation of hotspots. Background technique [0002] AP (Wireless Access Point (Wireless Access Point)), that is, wifi access point. The existing wifi is becoming more and more popular, and everyone is using it. A device that can provide wifi signals is a hotspot. You can use your mobile phone or laptop to search for hotspots and connect. Existing hotspot connections are based on ssid and password. , and generally as long as the hotspot with the same ssid and password appears nearby, it can be connected, which facilitates everyone's connection. For example, the hotspot of the existing bus, the user can connect to the hotspot of the bus when sitting on the bus or around the bus. But there is a problem, if the illegal ssid and password are disguised as the bus wifi, then the user can connect to the illegal hotspot, which will cause h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04W12/08H04W48/08H04W48/20H04W12/122
CPCH04W12/02H04W12/06H04W12/08H04W48/08H04W48/20
Inventor 郑建钦
Owner 郑建钦