Safety management method and access device

A technology for access equipment and security management, which is applied in the field of network information, can solve problems such as wireless network counter-attacks, and achieve the effects of improving user experience, preventing counter-attacks, and preventing counter-attacks

Active Publication Date: 2018-01-09
RUIJIE NETWORKS CO LTD
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides a security management method and access equipment to solve the problem in the prior art that wireless networks are more vulnerable to counterattacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety management method and access device
  • Safety management method and access device
  • Safety management method and access device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0063] The term "and / or" in this article is just an association relationship describing associated objects, which means that there can be three relationships, for example, A and / or B can mean: A exists alone, A and B exist simultaneously, and there exists alone B these three situations. In addition, the character " / " in this article generally ind...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safety management method and an access device, which are used for solving the problem that a wireless network is easy to be countered and attacked in the prior art, and accordingly further realizing effective striking and attacking, avoiding frequent offline and online of a user terminal and ensuring the normal communication of the network data. The safety management method particularly includes steps that an access device receives a first request message from a terminal; the access device judges if the first request message is the request message of releasing authentication or association to obtain a first judging result; when the first judging result is right, the access device further judges if a local agent station for the terminal is associated with the accesscontroller, and acquiring a second judging result, wherein the agent station corresponding to the terminal is applied to the sole marking terminal, and used for managing the first request message ofthe terminal; the access device identifies if the first request message is an abnormal request message on the basis of the first request message and the second judging result; when it is the abnormalrequest message, the first request message is abandoned.

Description

technical field [0001] The invention relates to the field of network information, in particular to a security management method and access equipment. Background technique [0002] With the continuous development of Internet technology, while enjoying various conveniences brought by the Internet, people are also threatened by various risks brought by the Internet every day. [0003] Especially in recent years, with the rise of various portable terminals such as mobile phones, tablet computers, etc., and the popularity of wireless networks, many businesses, public transportation, etc. will provide users with wireless networks to access the Internet, and users want to use wireless networks When accessing the Internet, it is generally required that the user terminal of the user first joins the corresponding wireless local area network. [0004] However, in a wireless local area network (Wireless Local Area Network, WLAN), to enable a user terminal to access the Internet, a wire...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 潘武荣
Owner RUIJIE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products