Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Leakage protection method and device

An illegal and legal technology used in the network field to solve problems such as blocking normal connections

Active Publication Date: 2018-12-14
SHENZHEN SUNDRAY NETWORK SCI TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Using the traditional anti-phishing AP method will also prevent the other company's terminal from connecting to the other company's AP normally, resulting in misjudgment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Leakage protection method and device
  • Leakage protection method and device
  • Leakage protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The leakage prevention method provided by the embodiment of the present invention can be applied to such as figure 1 environment shown. refer to figure 1 As shown, the wireless controller 102 can centrally control multiple APs, such as one of the APs 104 , through a wired connection or a wireless connection. The wireless controller 102 includes a terminal feature library for storing terminal features. The wireless controller 102 can send information to the terminal, and can also receive data transmitted by the AP 104 and analyze the received data to obtain specific information. AP104 can listen to the association frame or data frame broadcast within its coverage when the terminal connects to other APs or itself, and can also listen to the wireless data transmitted between the terminal and the illegal AP when the terminal has successfully connected to the illegal AP In addition, the AP 104 can also send information to terminals and other APs. Wherein, the association ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a secret leakage protection method, which includes listening to an associated frame or data frame broadcast when a terminal connects to an illegal AP; acquiring the terminal feature of the terminal according to the associated frame or data frame; detecting whether the terminal feature exists in the preset If it is in the preset terminal feature database, then implement leakage protection on the terminal. With this leak protection method, since the terminal feature database stores the terminal features of terminals capable of connecting to legitimate APs, the leak protection can only be implemented for terminals that exist in the terminal feature database, and for terminals that are not in the terminal signature database, the Leakage protection is not implemented, so that it will not affect the connection of terminals that are not in the terminal signature database to illegal APs, that is, it will not affect the connection of terminals of other enterprises to their APs, reducing misjudgment.

Description

technical field [0001] The present invention relates to the field of network technology, in particular to a leak protection method and device. Background technique [0002] With the development of network technologies, enterprises or organizations often set up enterprise APs (wireless AccessPoints, wireless access points) internally. Enterprise employees connect to enterprise APs for office work. On the one hand, it reduces the enterprise's requirements for terminal network cable layout and makes the employees' work space more open; on the other hand, it also facilitates employees to use BYOD (Bring Your Own Device, bring your own device) Office, improve the production efficiency of the enterprise. [0003] However, due to the openness of the wireless space, there will be criminals simulating the same or similar WLAN (Wireless Local Area Networks, wireless local area network) as the enterprise, and setting up phishing APs. It is easy for employees to connect to phishing AP...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/08H04W12/12H04W12/37
CPCH04W12/08H04W12/12
Inventor 刘玉训
Owner SHENZHEN SUNDRAY NETWORK SCI TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products