Fake access point detection alarm method and device

A technology of pseudo access point and access point, which is applied in the field of communication and can solve problems such as leakage of user information

Active Publication Date: 2016-09-14
PRANUS BEIJING TECH CO LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the shortcomings of the existing methods, the present invention proposes a false access point detection and alarm meth

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fake access point detection alarm method and device
  • Fake access point detection alarm method and device
  • Fake access point detection alarm method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0021] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be unders...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a fake access point detection alarm method and device. The method comprises the steps that a first access point is connected according to a preset service set identifier and a password thereof, and basic communication information of the first access point is obtained; after it is detected that the basic communication information of the first access point is not consistent with basic communication information of a prestored legal access point, a user is promoted to determine legality of the first access point; if a received determining result is illegal, fake access point alarm prompt is carried out, and the first access point is disconnected. In the fake access point detection alarm method and device, when the service set identifier (SSID) and the password of the first access point (AP) are consistent with those of the prestored legal AP and the basic communication information is not consistent with the basic communication information of the legal AP, if the received determining result input by the user is illegal, the first AP is the fake AP, then, fake AP alarm prompting is carried out, first AP is disconnected, and the user information leakage probability can be greatly lowered.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular, the present invention relates to a detection and alarm method and device for false access points. Background technique [0002] With the development of the economy and the advancement of technology, mobile terminals such as smart phones, tablet PCs and e-readers are widely popularized. These mobile terminals generally have an Internet access function, and generally use an AP (Access Point, access point) to access the Internet for network interaction. [0003] At present, the method for a mobile terminal to detect an AP is usually to detect the same SSID as the SSID stored in the mobile terminal, and then determine the stored wireless password when trying to access the AP according to the pre-stored wireless password corresponding to the SSID. Whether the password is consistent with the wireless password of the AP to which the detected SSID belongs; if so, access to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/08H04W12/12H04W48/16H04W12/122
CPCH04W12/08H04W12/12H04W48/16
Inventor 何跃义
Owner PRANUS BEIJING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products