Network steal prevention method of wireless router, and wireless router

A technology of wireless router and anti-scrambling network, which is applied in the field of communication, can solve problems such as inconvenience, and achieve the effect of avoiding the harassment of repeatedly receiving authentication applications

Inactive Publication Date: 2017-04-26
PHICOMM (SHANGHAI) CO LTD
View PDF5 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] There are security loopholes in the existing methods of authentication and management operations of universal access terminals based on device names and MAC addresses, and there are technical problems that are relatively inconvenient in the actual operation of the existing methods of managing routers through ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network steal prevention method of wireless router, and wireless router
  • Network steal prevention method of wireless router, and wireless router

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The wireless router anti-scraping network method and the wireless router provided by the present invention will be described in detail below in conjunction with the accompanying drawings.

[0018] refer to figure 1 , a schematic flowchart of the wireless router anti-scrambling method according to the present invention. The method includes the following steps: S11: receiving the wireless password entered when the terminal device requests to access the wireless router and the user identity verification field representing terminal user information; S12: verifying whether the wireless password is correct, and rejecting the wireless password if the password is wrong. If the password is correct, continue to execute step S13; S13: judge whether the terminal device is in the current blacklist or whitelist according to the device information of the terminal device, and if so, execute step S14 , otherwise execute step S15; S14: If it is in the blacklist, reject the access reques...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network steal prevention method of a wireless router and the wireless router, wherein the method can carry out the recognition management of access terminal equipment and network steal prevention. The method combines an equipment name/MAC address and a user identity verification field for representing identity information of a terminal user, thereby enabling a common user to manage the terminals, connected to the wireless router, more intelligently, quickly and safely. Meanwhile, the method has a function of automatically generating a black/white list after the number of authorization or rejection times of a networking request from one piece of terminal equipment reaches a preset threshold value, and the user does not need to carry out the manual adding and setting. The black/white list is combined with the one-key authorization/rejection of a manager terminal, and equipment where the black/white list is added can directly determine the networking rejection or authorization, thereby preventing the manager terminal from repeatedly affected by the disturbance of authentication application.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a wireless router anti-scratch network method and a wireless router that can perform identification management and anti-scratch network on access terminal equipment. Background technique [0002] At present, the authentication and management of access terminal devices by wireless routers are all based on the operation of the MAC address list and the name of the terminal device, which is quite inconvenient. [0003] Patent CN201410301959.9 proposes an anti-scratch network wireless routing device that supports timely setting of black and white lists, and patent CN201410289448.X proposes a method for generating a blacklist through the threshold of authentication failure times. The generation and setting of the black and white lists in the above method are all aimed at the MAC address of the device, and there are obvious defects: First, ordinary users who are not professionals...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/771H04L29/06H04L29/08H04W12/06H04L45/60H04W12/084
CPCH04L45/60H04L63/083H04L63/0876H04L67/10H04W12/06
Inventor 项智强
Owner PHICOMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products