A method and system for encrypting, hiding and discovering wifi access points

An access point and access point information technology, applied in the field of communication, can solve problems affecting network use effect and data security, AP password cracking and misappropriation, etc., and achieve the effect of reducing the risk of misappropriation

Active Publication Date: 2018-09-18
TCL CORPORATION
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this case, if an illegal user grabs the management frame interacted between the STA and the AP through a network analysis sniffer based on the principle of passive listening, it can still obtain the relevant information of the AP, and can further send a non- The broadcast probe request frame exposes the AP to the manipulation of the illegal user, thereby causing the AP password to be cracked and stolen, which ultimately affects the use of the network by the AP owner itself and data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for encrypting, hiding and discovering wifi access points
  • A method and system for encrypting, hiding and discovering wifi access points
  • A method and system for encrypting, hiding and discovering wifi access points

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention provides a method and system for encrypting, hiding and discovering WIFI access points. In order to make the purpose, technical solution and effect of the present invention clearer and clearer, the present invention will be further described in detail below. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0035] Such as figure 1 The method for hiding and discovering a kind of WIFI access point encryption, wherein, said method comprises the following steps:

[0036] S100. Pre-generate a first public key and a first private key of an asymmetric encryption algorithm, set the first public key in a WIFI access point, and set the first private key in the WIFI terminal.

[0037] Preferably, a "public key key setting" edit box can be added on the setting page of the AP (that is, the WIFI access point), through which the setting of the first public ke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method and system for WIFI access point encryption hiding and discovery, the method is: A. generating a first public key and a first private key, the first public key is set in the AP, and the first private key is Set in STA; B. Generate a second public key and a second private key, add the second public key to the management frame, encrypt the frame body with the first public key, and send it to STA; C, STA use the first private key to decrypt This encryption is used to discover the AP and save the second public key; D, STA uses the second public key to send subsequent management frames to the AP, and the AP uses the second private key to decrypt the subsequent management frames; the AP uses the first public key to send subsequent management frames to the AP STA. The STA uses the first private key to decrypt the received subsequent management frame. The invention utilizes an asymmetric encryption algorithm to encrypt the STA and AP management frames. Only when the STA has the correct key to decrypt the management frame can it discover the existence of the AP, thereby hiding the visibility of unauthorized users to the AP and reducing the risk of AP theft.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and system for encrypting and hiding and discovering WIFI access points. Background technique [0002] With the development of network technology, WIFI (wireless network) technology has been widely used in various electronic devices, and WIFI terminal (STA) depends on WIFI access point (AP) to access the network. Currently used APs usually achieve the purpose of hiding APs by not sending beacon frames (beacon frames) and not responding to broadcast probe request frames (probe request frames). However, in this case, if an illegal user grabs the management frame interacted between the STA and the AP through a network analysis sniffer based on the principle of passive listening, it can still obtain the relevant information of the AP, and can further send a non- The broadcast probe request frame exposes the AP to the control of the illegal user, thus causing the AP password to be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/03H04W12/041H04W12/0431
Inventor 曾永莹
Owner TCL CORPORATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products