Method and device of access point equipment for preventing error access

A wrong access and access point technology, which is applied in the direction of data exchange through path configuration, user identity/authority verification, etc., can solve the problems that other users' keys cannot be kept secret, and wireless terminals access WLAN, which is inconvenient. Achieve the effect of reducing the risk of user complaints, reducing the number of connection failures, and reducing the impact

Inactive Publication Date: 2008-03-12
NEW H3C TECH CO LTD
View PDF0 Cites 64 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, the AP and all the wireless terminals connected to it use the same key, and the users who use the same AP also use the same key, so it will bring the following problems: once the key of one of the users leaks, the keys of other users can't keep it secret
For example: two wireless terminals that are very close to each other belong to different APs, but in the process of searching for APs in the above step 201, since the SSID of the neighbor wireless terminal is the same as that of the neighbor wireless terminal, it is very likely to search for the neighbor AP, then, it will automatically try Connect to the neighbor's AP, but because the operator has bound the ADSL port, user name and password, the wireless terminal cannot access the WLAN through the neighbor's AP
[0023] As analyzed above, it is possible to prevent others from accessing the AP through MAC address filtering and WEP encryption. However, both of these methods require manual configuration by the user, which is very cumbersome. It is also inconvenient to configure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device of access point equipment for preventing error access
  • Method and device of access point equipment for preventing error access
  • Method and device of access point equipment for preventing error access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] In this embodiment, the AP device hides the SSID in the Beacon frame broadcast to each wireless terminal, and the wireless terminal searches for the SSID through a Probe Request method.

[0057] Referring to Fig. 3, it is a flowchart of Embodiment 1, including:

[0058] Step 301: the wireless terminal sends a Probe Request to request a ProbeResponse including SSID, etc.;

[0059] Step 302: the AP device responds to the Probe Request of the wireless terminal, and feeds back a ProbeResponse including the SSID;

[0060] Wherein, the Probe Response includes the basic information of the BSS to which the AP belongs and the basic capability level of the AP.

[0061] In practical applications, due to the strength of the signal, it is likely that the neighbor AP also feeds back the Probe Response to the wireless terminal, and the feedback signal is stronger, causing the wireless terminal to mistakenly connect to the AP device.

[0062] Step 303: the wireless terminal requests ...

Embodiment 2

[0071] Different from the hidden SSID in the Beacon frame in Embodiment 1, the Beacon frame in this embodiment carries the SSID, and the wireless terminal obtains information such as the SSID by listening to the Beacon frame broadcast by the AP device. When the AP device receives a certain wireless When the terminal prohibits access notification, send a mismatch notification to the wireless terminal, informing the wireless terminal that the SSID used does not match and cannot log in to the network successfully, so that the user can use other SSID to access the WLAN, and also avoid the user's complaint without knowing it.

[0072] Referring to Fig. 4, it is a flow chart of embodiment two, including:

[0073] Step 401: The AP device broadcasts the Beacon frame carrying the SSID;

[0074] Step 402: After the wireless terminal detects the Beacon frame, it requests authentication from the BRAS or the AC controller through the AP device;

[0075] Step 403: the BRAS device or the AC...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The utility model discloses a method for guarding against the misconnection to the AP equipment. After the wireless terminal requires for the certification from the network via the AP equipment, the network will examine the validity of the wireless terminal. When the certification fails, the network equipment will record the illegal frequency of the wireless terminal's misconnection to the AP equipment. When the illegal frequency reaches the preset threshold, the network equipment will send the signal to the AP equipment for forbidding the wireless terminal access. After the signal is received by the AP equipment, the response t the wireless terminal is forbidden. The utility model can be used to effectively prevent the disabled user's access to the AP equipment. As the frequency of misconnection is arranged and dynamically adjusted, the influence to the user operation can be reduced, so as to lower the frequency of connect failure and the user's complains. As responding to the above method, the utility model also provides a device used for guarding against the misconnection to the AP equipment.

Description

technical field [0001] The present invention relates to the field of wireless local area network (Wireless LAN, WLAN) security technology, in particular to a method and device for preventing wrong access to access point (Access Point, AP) equipment. Background technique [0002] Due to the open transmission medium of wireless communication, the security performance of WLAN has always been the focus of attention. The currently established WLAN security mechanism mainly includes three aspects: service set identifier (Service SetIdentifier, SSID) mechanism, physical address (MAC) filtering control mechanism and the Wired Equivalent Privacy (WEP) mechanism, which will be introduced respectively below. [0003] 1. SSID [0004] In WLAN, different SSIDs are firstly configured for multiple access points, and wireless terminals must know the SSIDs in order to send and receive data in the network. If a mobile terminal attempts to access the WLAN, the AP first checks the SSID of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L12/28
Inventor 刘宝祥郑涛姚析张海涛
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products