A verification method and system for an anti-counterfeiting wifi access point

An access point, anti-counterfeiting technology, applied in the field of information security, can solve the problems of user information theft, the wireless router signal coverage is not stable enough, etc., and achieve the effect of good recognition effect

Active Publication Date: 2020-12-04
HARBIN ANTIY TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the signal coverage of the wireless router is not stable enough, the user's device will automatically connect to the wifi access point created by the attacker when it connects again. Once access and communication occurs, user information will be stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A verification method and system for an anti-counterfeiting wifi access point
  • A verification method and system for an anti-counterfeiting wifi access point

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the present invention will be further detailed below in conjunction with the accompanying drawings illustrate.

[0031] The present invention provides a verification method embodiment of an anti-counterfeiting wifi access point, such as figure 1 shown, including:

[0032] S101: The router generates an identifier when sensing that a user equipment is connected to wifi;

[0033] S102: The router sends the combination information of its own MAC address and identifier as the access point verification information to the user equipment according to regulations; the combination of its own MAC address and identifier according to regulations includes: character string combination, text combina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention proposes a method and system for verifying an anti-counterfeiting wifi access point. When a router senses that a user device is connected to wifi, it generates an identifier; the router sends the combined information of its own MAC address and the identifier as the access point verification information according to regulations. To the user equipment; when the user equipment accesses Internet data through wifi, the router sends the combined information of the corresponding Internet data and the identifier as the access transmission data to the user equipment; the user equipment judges the received access transmission according to the access point verification information Whether the data meets the specified standards, if so, the wifi network environment is considered safe, otherwise the network connection is disconnected. The present invention does not adopt a complicated encryption method, but mainly relies on identifiers for identification, so it does not cause a large delay in information transmission between users and routes.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for verifying an anti-counterfeiting wifi access point. Background technique [0002] Nowadays, the security encryption technology of wifi is relatively perfect, among which the more common ones are: WEP, WPA, WPA2. WEP (Wired Equivalent Privacy) uses a static key to encrypt all communications, and the user and the AP (Access-Point) of the wireless network have the same key to be able to interpret the data transmitted between them. WPA uses a dynamic key to continuously change the key, which is more secure than WEP and can be applied across wireless network cards from different manufacturers. Therefore, if there are high requirements for data security, WPA encryption must be selected. WPA2 is an enhanced version of WPA that uses more secure AES encryption. [0003] Since the encryption technology is relatively perfect, and wifi is transmitted by...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/08H04W12/12H04W48/18H04W76/30H04W84/12H04W12/122
CPCH04W12/08H04W12/12H04W48/18H04W76/30H04W84/12
Inventor 吕智慧张春雷韩文奇
Owner HARBIN ANTIY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products