Security monitoring strategy generation method and device
A technology of security monitoring and strategy, applied in the field of Internet of Things, can solve problems such as socket power failure, monitoring blind area, and impracticability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach 1
[0151] In this embodiment, the format of the beacon frame is format 1 or format 2. The specific process is as figure 2 shown.
[0152] Step 100, the AP judges whether the network has the ability to identify the user of the terminal that accesses the network as a user that needs to be monitored by security, and if so, sets the value of the Security Flag field in the beacon frame to indicate that the network has this ability; otherwise, sets The value of the Security Flag field in the beacon frame indicates that the network does not have this capability, or the Security Flag field is not carried in the beacon frame.
[0153] In this step, the setting method of the value of the Security Flag field is the same as that described above.
[0154] Step 101, the terminal performs active scanning, monitors the beacon frames sent by the surrounding APs, receives and parses the beacon frames sent by the APs, and judges whether the beacon frames carry the Security Flag field, if the bea...
Embodiment approach 2
[0160] In this embodiment, the beacon frame format is format 3.
[0161] Step 200, the AP sends a beacon frame;
[0162] Step 201, the terminal performs active scanning, monitors the beacon frames sent by the surrounding APs, and judges whether the user of the terminal needs to be monitored for security. If the user needs to be monitored for security, send a detection request frame carrying the Security Flag field to the AP; Probe request frame carrying the Security Flag field.
[0163] Preferably, when the terminal receives beacon frames sent by multiple APs, if the user of the terminal does not need to be monitored safely, then according to the prior art, such as selecting the AP with the strongest signal strength or selecting the desired signal according to other selected selection strategies. Connected AP; if the user of the terminal needs to be monitored safely, first select a candidate AP according to the set strategy, which is the same as the existing technology, such ...
Embodiment approach 3
[0168] For the active scanning of the terminal to join the network, it mainly includes the following steps:
[0169] Step 300, judging whether the user of the terminal needs to be monitored by security, if so, sending a probe request frame carrying the Security Flag field, if not, sending a probe request frame not carrying the Security Flag field;
[0170] Step 301, the AP receives the detection request frame, and if the network has the ability to identify the user of the terminal accessing the network as a user who needs to be monitored for security, judge whether the detection request frame carries the Security Flag field, and if so, sends the detection request frame carrying the Security Flag field Probe response message to prompt the user to be monitored. If the network does not have this capability, the field will not be parsed, and a Probe Response frame that does not carry the Security Flag field will be sent.
[0171] Through the above method, regardless of whether th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


