Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Method of Security Strengthening Router

A router and security technology, applied in the field of wireless Internet security applications, can solve problems such as attacks and difficult protection

Active Publication Date: 2020-06-02
XIAN JIAOTONG UNIV CITY COLLEGE
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the router is not protected by the https protocol. Not only can it be monitored and captured, but it can also be attacked by passwords running on the intranet. It is even more difficult to protect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Security Strengthening Router
  • A Method of Security Strengthening Router
  • A Method of Security Strengthening Router

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The implementation of the present invention will be described in detail below in conjunction with the drawings and examples.

[0026] as above figure 1 As shown, when a new WiFi login verification request arrives, the router judges based on the MAC address of the client device, whether the device is listed in the router's blacklist? If yes, discard the verification request; if no, continue to judge whether it has logged in to the router before, if not, it is the first request for a new client to log in to the network, triggering a notification [alarm] event (*Note 1: see image 3 Explanation, the same below); if it is a client that has logged in before and requests to log in again, the trigger notification [alarm] event is omitted, and the verification process is directly started.

[0027] If the WiFi password verification is passed once, the IP address can be assigned by the router DHCP (in the case of dynamic IP allocation), and according to the user configuration in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for security enhancement of routers, setting WiFi login verification on the router side, triggering the verification when a device tries to access the router, the host side obtains the device information, and judges whether the device has been blacklisted, and if so, ends Verify and deny access; if not, go to the next step; the host side judges whether the device has logged in to the router before, if not, triggers an alarm, and then proceeds to the next step of verification; if yes, proceeds to the next step of verification directly; During the verification process, if the WiFi password verification passes once, the router DHCP will assign an IP address, and according to the user configuration information, decide whether to trigger a notification and how to notify. The content of the notification is the event that a device has logged into the intranet; If the password verification fails, the verification failure policy is triggered and the access is rejected. The present invention integrates related hardware and software for the router, and triggers a reminder when a new client accesses the WiFi, so that the user can keep track of the use of the router at any time.

Description

technical field [0001] The invention belongs to the technical field of wireless Internet security applications, relates to wireless terminal routing equipment, and in particular to a method for enhancing security of a router. Background technique [0002] In the actual WiFi application scenario, if it is just being hacked, it is not enough to attract people's security attention in most cases, but if it involves privacy leaks, security loopholes, and even further causes economic benefits, personal reputation, and business secrets. , it may be too late by then. The wireless router is the terminal for users to access the Internet, and it is also the link with the weakest security and the most prone to problems. There are two steps to the security problem here: the first step, the WiFi password is cracked (or leaked), which creates an opportunity for unauthorized LAN access; the second step, the router itself is compromised, after which not only the router supported The securi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/771H04L29/06H04W48/16H04L45/60
CPCH04L45/60H04L63/02H04L63/1441H04W48/16
Inventor 赵彩
Owner XIAN JIAOTONG UNIV CITY COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products