A kind of wifi security authentication method

A security certification, the only technology, applied in the Internet field, can solve problems such as easy password leakage, to achieve the effect of avoiding password leakage and ensuring security

Active Publication Date: 2021-06-25
JIANGSU FUTURE NETWORKS INNOVATION
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a WiFi security authentication method, which solves the technical problem that passwords are easily leaked when WiFi is connected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of wifi security authentication method
  • A kind of wifi security authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] WiFi has a risk of password leakage. The root cause is that all users use the same SSID and password to access an AP. The present invention realizes the same WiFi, and the SSID and password accessed by each STA are different, so that the problem of password leakage can be avoided, thereby ensuring the security of WiFi access authentication.

[0023] Such as figure 1 and figure 2 A WiFi security authentication method shown includes the following steps:

[0024] Step 1: hide the Beacon frame broadcast by the AP in the AP, that is, cancel the SSID option, so that the STA cannot obtain the SSID name through passive scanning;

[0025] Step 2: The AP waits for the probe request frame from the STA;

[0026] Step 3: The STA actively sends a detection request frame to the AP, and the AP makes a judgment based on the STA's MAC address and the admission mechanism: if the access is not allowed, no corresponding processing is performed on the wireless frame of the STA, and step ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a WiFi security authentication method, which belongs to the technical field of the Internet. First, the Beacon frame broadcast by the AP is hidden, and then a unique SSID name and a unique password corresponding to the MAC address of the STA are generated, and then the MAC address of the STA corresponds to the The SSID name and password for STA connection authentication solves the technical problem that the password is easy to leak when connecting to WiFi. It can realize the same WiFi without changing the current system hardware and protocol. The SSID and The passwords are different to avoid the problem of password leakage, thereby ensuring the security of WiFi access authentication.

Description

technical field [0001] The invention belongs to the technical field of the Internet, in particular to a WiFi security authentication method. Background technique [0002] WiFi is a technology that allows electronic devices to connect wirelessly, usually using 2.4G UHF or 5G SHF ISM radio frequency bands. Connections to WiFi are usually password-protected; but they can also be open, allowing any device within range of the signal to connect. As another form of network access other than the wired network, WiFi technology has natural flexibility and mobility in network construction, device access and data communication because it does not require physical network cable connections; With the substantial increase of mobile STA devices, WiFi technology has been widely used. [0003] Password-protected WiFi also has the risk of password leakage. There are three main ways: first, it is cracked violently by hackers or attacks system and protocol vulnerabilities; resulting in leakag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/73H04W12/06H04W84/12H04L29/06H04W12/0431H04W12/069H04W12/71
CPCH04L63/101H04W12/04H04W12/06H04W84/12
Inventor 张骏张广兴廖彬彬
Owner JIANGSU FUTURE NETWORKS INNOVATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products