Method for realizing hotspot security through authentication server
A technology for authenticating servers and hotspots, used in security devices, wireless communications, electrical components, etc., and can solve problems such as hotspot impersonation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] In order to describe in detail the technical content, structural features, achieved goals and effects of the technical solution, the following will be described in detail in conjunction with specific embodiments.
[0033] see figure 1 As shown, this embodiment provides a method for implementing hotspot security through an authentication server, which can be applied to figure 1 In the system 100, it is applied between the client, the hotspot and the authentication server, and the client can be a mobile phone 101 or a notebook client. The hotspot 102 stores a unique first encryption method, which means it is different from other hotspots and can be uniquely associated with the identification information of the hotspot. The authentication server 103 stores the first decryption method corresponding to the first encryption method.
[0034] The method includes the following steps: the hotspot changes the ssid and password at regular intervals; the hotspot encrypts the ssid ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 