Method of detecting incorrect ieee 802.11 wep key information entered in a wireless station
A wireless network, client technology, used in wireless communication, key distribution, and can solve problems such as relying on transmission of data
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] In order to quickly verify whether the key information of a wireless network client matches the key information of an access point, a test data frame can be sent from a wireless network client to an access point, and then sent from the access point Return to the wireless platform. Please refer to FIG. 3 . FIG. 3 shows a frame of transmitting encrypted test data to verify whether the key information of a wireless network client 14 matches the key information of an access point 12 . The wireless network client 14 has a key table 34, wherein the key table 34 includes four key IDs ID0-ID3 and their corresponding keys KEY0-KEY3; similarly, the access point 12 also has a key table 32, wherein the key table 32 includes four key IDs ID0-ID3 and their corresponding keys KEY0'-KEY3'.
[0024] When the wireless network client 14 is configured to connect to the access point 12 , the wireless network client 14 will immediately generate a test data frame 42 for sending to the access...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 