Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for detecting karma attack

A technology for attacking equipment and detection units, which is applied in the field of wireless networks and can solve problems such as user equipment security hazards

Active Publication Date: 2015-01-07
KINGSOFT
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] When the user device is connected to WIFI, it may be attacked by Karma, which will endanger the security of the user device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting karma attack
  • Method and device for detecting karma attack
  • Method and device for detecting karma attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] see figure 1 , the embodiment of the present invention provides a method for detecting karma attacks, including:

[0026] S11. Determine whether the user equipment is connected to Wifi;

[0027] S12, if not connected to Wifi, then detect whether there is a karma attack device around the user equipment;

[0028] S13. If Wifi is already connected, it is detected whether the Wifi hotspot connected to the user equipment is a karma attacking device.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method and device for detecting the karma attack, and relates to the technical field of wireless networks. The method and the device solve the problem that in the prior art, the karma attack on a user device may happen when the user device has access to the WIFI. The method for detecting the karma attack includes the steps of judging whether the user device has had access to the Wifi or not, detecting whether a karma attack device exists around the user device or not if the user device has not had access to the Wifi, and detecting whether the Wifi hotspot which the user device has access to is the karma attack device or not if the user device has had access to the Wifi. The method and the device are mainly used for detecting whether the karma attack happens to the user device when the user device has access to the Wifi.

Description

technical field [0001] The invention relates to the technical field of wireless networks, in particular to a method and device for detecting karma attacks. Background technique [0002] At present, when people use user equipment such as mobile terminals or PCs to access the Internet, they often use WIFI (WIreless-Fidelity, wireless fidelity) to connect to the network. Regardless of whether it is a mobile device or a PC, as long as it is a WIFI hotspot that has been connected, it will be automatically saved. The next time these hotspots appear in the same area, the user device will automatically connect again. [0003] In order to speed up the connection, the user equipment will broadcast the ESSID (Extended Service Set Identifier, Extended Service Set Identifier) ​​of all WIFI hotspots that it has ever connected to. For example, if the user equipment has been connected to WIFI hotspots such as CMCC and Airport Free, the user equipment will actively broadcast the connected W...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04W12/12
CPCH04W12/12
Inventor 林坚明赵闽
Owner KINGSOFT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products