CN112671765B - Method and device for verifying validity of wireless network equipment - Google Patents
Method and device for verifying validity of wireless network equipment Download PDFInfo
- Publication number
- CN112671765B CN112671765B CN202011541388.8A CN202011541388A CN112671765B CN 112671765 B CN112671765 B CN 112671765B CN 202011541388 A CN202011541388 A CN 202011541388A CN 112671765 B CN112671765 B CN 112671765B
- Authority
- CN
- China
- Prior art keywords
- mac address
- wireless network
- network equipment
- false
- blacklist database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a method and a device for verifying the validity of wireless network equipment, wherein the method comprises the following steps: acquiring an MAC address of wireless network equipment to be verified; verifying the validity of the MAC address of the wireless network equipment; if the verification is true, connecting the wireless network equipment; if the verification is false, determining the MAC address of the wireless network device as a false MAC address. The scheme of the invention obtains the MAC address of the wireless network equipment to be verified, then carries out validity verification on the MAC address of the wireless network equipment, if the verification is true, the wireless network equipment is connected, if the verification is false, the MAC address of the wireless network equipment is determined as a false MAC address, and thus the uniqueness of the MAC address is utilized to carry out validity verification, thereby effectively verifying the validity of the wireless network equipment.
Description
Technical Field
The present invention relates to the field of information security technologies, and in particular, to a method and an apparatus for verifying validity of a wireless network device.
Background
Information security has become a focus of attention in the current information age.
In the prior art, when a terminal device is connected to a wireless network device, security assurance software (e.g., 360 security guards) installed in the terminal device does not verify the validity of the wireless network device, which is not favorable for ensuring the information security of a user. That is, when the wireless network device connected to the terminal device is illegal, the data stored in the terminal device may be stolen by a lawbreaker using the wireless network device.
Therefore, a method and an apparatus for verifying the validity of a wireless network device are needed to solve the above-mentioned problems.
Disclosure of Invention
The embodiment of the invention provides a method and a device for verifying the validity of wireless network equipment, which can effectively verify the validity of the wireless network equipment.
In a first aspect, an embodiment of the present invention provides a method for verifying the validity of a wireless network device, including:
acquiring an MAC address of wireless network equipment to be verified;
verifying the validity of the MAC address of the wireless network equipment;
if the verification is true, connecting the wireless network equipment;
if the verification is false, determining the MAC address of the wireless network device as a false MAC address.
In one possible design, the legality verifying the MAC address of the wireless network device includes:
determining whether a least significant bit of a first byte from left to right of a MAC address of the wireless network device is 0 and a second least significant bit is 0;
if the verification is true, connecting the wireless network device, including:
connecting the wireless network device if the least significant bit is 0 and the second least significant bit is 0;
if the verification is false, determining the MAC address of the wireless network device as a false MAC address, including:
if the least significant bit is not 0, determining the MAC address of the wireless network device as a false MAC address.
In one possible design, before the legality verifying the MAC address of the wireless network device, the method further includes:
creating a first blacklist database, wherein the first blacklist database is used for storing false MAC addresses verified by a plurality of users;
after the determining the MAC address of the wireless network device as a false MAC address, further comprising:
comparing the MAC address of the wireless network equipment with the false MAC address stored in the first blacklist database;
disconnecting the wireless network device if a false MAC address exists that is the same as the MAC address of the wireless network device;
and if the false MAC address which is the same as the MAC address of the wireless network equipment does not exist, skipping to carry out validity verification on the MAC address of the wireless network equipment, and when the MAC address of the wireless network equipment is determined to be the false MAC address, storing the determined false MAC address into the first blacklist database.
In one possible design, after storing the determined false MAC address in the first blacklist database, further comprising:
determining whether a rule for verifying the validity of the MAC address of the wireless network equipment changes;
if the data state of the determined false MAC address is not changed, determining the data state of the determined false MAC address as an effective state, and storing the information of the effective state into the first blacklist database;
and if the MAC address changes, determining the data state of the determined false MAC address as an invalid state, and skipping to execute validity verification on the MAC address of the wireless network equipment.
In one possible design, before the legality verifying the MAC address of the wireless network device, the method further includes:
creating a first blacklist database and a second blacklist database, wherein the first blacklist database is used for storing false MAC addresses verified by a plurality of users, and the second blacklist database is used for storing a false MAC address verified by a user;
after the determining the MAC address of the wireless network device as a false MAC address, further comprising:
comparing the MAC address of the wireless network equipment with the false MAC address stored in the second blacklist database;
if a false MAC address exists in the second blacklist database and is the same as the MAC address of the wireless network equipment, disconnecting the wireless network equipment;
if the false MAC address which is the same as the MAC address of the wireless network equipment does not exist in the second blacklist database, comparing the MAC address of the wireless network equipment with the false MAC address stored in the first blacklist database;
if a false MAC address exists in the first blacklist database and is the same as the MAC address of the wireless network equipment, disconnecting the wireless network equipment;
if the false MAC address identical to the MAC address of the wireless network equipment does not exist in the first blacklist database, skipping to execute validity verification on the MAC address of the wireless network equipment, and when the MAC address of the wireless network equipment is determined to be the false MAC address, storing the determined false MAC address into the first blacklist database and the second blacklist database.
In one possible design, after the storing the determined false MAC address in the first blacklist database and the second blacklist database, further comprising:
determining whether a rule for verifying the validity of the MAC address of the wireless network equipment changes;
if the data state of the determined false MAC address is not changed, determining the data state of the determined false MAC address as an effective state, and storing the information of the effective state into the first blacklist database and the second blacklist database;
and if the MAC address changes, determining the data state of the determined false MAC address as an invalid state, and skipping to execute validity verification on the MAC address of the wireless network equipment.
In one possible design, the obtaining the MAC address of the wireless network device to be authenticated includes:
calling an application program interface of wireless network equipment to be verified, wherein the application program interface is used for connecting the storage position of the MAC address of the wireless network equipment;
and acquiring the MAC address of the wireless network equipment.
In a second aspect, an embodiment of the present invention provides an apparatus for verifying validity of a wireless network device, including:
the acquisition module is used for acquiring the MAC address of the wireless network equipment to be verified;
a verification module to perform the following operations:
verifying the validity of the MAC address of the wireless network equipment;
if the verification is true, connecting the wireless network equipment;
if the verification is false, determining the MAC address of the wireless network device as a false MAC address.
In a third aspect, an embodiment of the present invention provides an apparatus for verifying validity of a wireless network device, including: at least one memory and at least one processor;
the at least one memory to store a machine readable program;
the at least one processor is configured to invoke the machine-readable program to perform the method described above.
In a fourth aspect, embodiments of the present invention provide a computer-readable medium having stored thereon computer instructions, which, when executed by a processor, cause the processor to perform the method described above.
According to the scheme, the method and the device for verifying the legitimacy of the wireless network equipment provided by the invention can effectively verify the legitimacy of the wireless network equipment by acquiring the MAC address of the wireless network equipment to be verified, then carrying out the legitimacy verification on the MAC address of the wireless network equipment, connecting the wireless network equipment if the verification is true, and determining the MAC address of the wireless network equipment as a false MAC address if the verification is false.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart of a method for verifying the validity of a wireless network device according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a device where a verification apparatus for verifying the validity of a wireless network device according to an embodiment of the present invention is located;
fig. 3 is a schematic diagram of an apparatus for verifying the validity of a wireless network device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer and more complete, the technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention, and based on the embodiments of the present invention, all other embodiments obtained by a person of ordinary skill in the art without creative efforts belong to the scope of the present invention.
Fig. 1 is a flowchart of a method for verifying the validity of a wireless network device according to an embodiment of the present invention. As shown in fig. 1, the method may include the steps of:
In this step, the acquired MAC address of the wireless network device should be understood as a real MAC address. Since there are some technical means in the prior art to falsely modify the MAC address of the wireless network device when the user connects to the wireless network device (e.g., a router), if the MAC address obtained according to the web page logged into the wireless network device may not obtain the real MAC address, that is, the obtained MAC address is likely to be a falsely modified MAC address. In order to obtain the real MAC address of the wireless network device, the supplier can embed an application program interface for calling the real MAC address in the wireless network device when producing the wireless network device, so that the user can obtain the real MAC address when using the wireless network device. Of course, in order to improve the authenticity of this manner, it may be considered to add an encryption process in the calling process, which is not described herein again.
In an embodiment of the present invention, the step 101 may specifically include the following steps:
calling an application program interface of the wireless network equipment to be verified, wherein the application program interface is used for connecting the storage position of the MAC address of the wireless network equipment;
the MAC address of the wireless network device is obtained.
When a user wants to connect to the wireless network device, a terminal device (such as a mobile phone or a computer) calls the application program interface through a code to acquire a real MAC address of the wireless network device.
102, verifying the validity of the MAC address of the wireless network equipment; if the verification is true, connecting the wireless network equipment; if the verification is false, the MAC address of the wireless network device is determined to be a false MAC address.
In this step, the validity verification may be verified in a regular expression manner.
In a specific implementation, for example, the following steps may be included:
determining whether the least significant bit of the first byte from left to right of the MAC address of the wireless network device is 0 and whether the second least significant bit is 0;
if the verification is true, connecting the wireless network equipment, including:
if the least significant bit is 0 and the second least significant bit is 0, connecting the wireless network equipment;
if the verification is false, determining the MAC address of the wireless network device as a false MAC address, comprising:
if the least significant bit is not 0, the MAC address of the wireless network device is determined to be a false MAC address.
In the embodiment of the invention, the validity verification of the MAC address is to add a check condition by utilizing the characteristic of global uniqueness of the MAC address, and according to the rule definition of the MAC address, the representation form of the MAC address is 6 bytes in total, specifically 12 16-system numbers, and every 2 16-system numbers are separated by a colon. The MAC with the least significant bit of the first byte from left to right being 0 and the second least significant bit being 0 is a legal MAC address, and it should be noted that, of course, before the rule is formulated, the second least significant bit of the MAC address of some enterprises is 1, and thus, the MAC address can also be proved to be a legal MAC address. However, it can be determined that a MAC address having less significant bits than 0 can be determined as a false MAC address. Therefore, whether the MAC address of the wireless network device is legal or not can be determined in the above mode.
In order to achieve validity verification for as many users using wireless network devices as possible, it may be considered to create a blacklist database for storing all the verified false MAC addresses of all the users. In an embodiment of the present invention, before performing validity verification on the MAC address of the wireless network device, the method further includes:
creating a first blacklist database, wherein the first blacklist database is used for storing false MAC addresses verified by a plurality of users;
after determining the MAC address of the wireless network device as a false MAC address, further comprising:
comparing the MAC address of the wireless network equipment with the false MAC address stored in the first blacklist database;
if a false MAC address is the same as the MAC address of the wireless network equipment, disconnecting the wireless network equipment;
and if the false MAC address identical to the MAC address of the wireless network equipment does not exist, skipping to carry out validity verification on the MAC address of the wireless network equipment, and when the MAC address of the wireless network equipment is determined to be the false MAC address, storing the determined false MAC address into a first blacklist database.
In the embodiment of the invention, the first blacklist database used for storing the false MAC addresses verified by a plurality of users is arranged, so that each user using the wireless network equipment can realize data sharing, and the legality verification process is simplified.
In an embodiment of the present invention, after storing the determined false MAC address in the first blacklist database, the method further includes:
determining whether a rule for verifying the validity of the MAC address of the wireless network equipment changes;
if the data state of the determined false MAC address is not changed, determining the data state of the determined false MAC address as an effective state, and storing the information of the effective state into a first blacklist database;
and if the MAC address changes, determining the data state of the determined false MAC address as an invalid state, and skipping to execute validity verification on the MAC address of the wireless network equipment.
In the embodiment of the invention, since different legitimacy verification rules determine whether the MAC address is a false MAC address, when one legitimacy verification rule is adopted, the batch of MAC addresses may be false MAC addresses, but when another legitimacy verification rule is adopted, part or all of the batch of MAC addresses may not be false MAC addresses. Therefore, it is necessary to determine whether a rule for performing validity verification on the MAC address of the wireless network device changes, so that validity and authenticity of the validity verification can be guaranteed.
In one embodiment of the present invention, before performing validity verification on the MAC address of the wireless network device, the method further includes:
creating a first blacklist database and a second blacklist database, wherein the first blacklist database is used for storing false MAC addresses verified by a plurality of users, and the second blacklist database is used for storing a false MAC address verified by a user;
after determining the MAC address of the wireless network device as a false MAC address, further comprising:
comparing the MAC address of the wireless network equipment with the false MAC address stored in the second blacklist database;
if a false MAC address exists in the second blacklist database and is the same as the MAC address of the wireless network equipment, disconnecting the wireless network equipment;
if the false MAC address which is the same as the MAC address of the wireless network equipment does not exist in the second blacklist database, comparing the MAC address of the wireless network equipment with the false MAC address stored in the first blacklist database;
if a false MAC address exists in the first blacklist database and is the same as the MAC address of the wireless network equipment, disconnecting the wireless network equipment;
and if the first blacklist database does not have the false MAC address which is the same as the MAC address of the wireless network equipment, skipping to carry out validity verification on the MAC address of the wireless network equipment, and when the MAC address of the wireless network equipment is determined to be the false MAC address, storing the determined false MAC address into the first blacklist database and the second blacklist database.
In the embodiment of the invention, the first blacklist database used for storing the false MAC addresses verified by a plurality of users is arranged, so that each user using the wireless network equipment can realize data sharing, and the legality verification process is simplified. Further, by providing a second blacklist database (which may be understood as a local or native blacklist database) for storing a false MAC address verified by a user, when the terminal device is not networked (i.e. the terminal device cannot access the first blacklist database), the MAC address of the wireless network device may be first verified using the second blacklist database (i.e. verifying whether the MAC address of the wireless network device is in the second blacklist database), if there is no false MAC address in the second blacklist database that is the same as the MAC address of the wireless network device, the lifelong equipment can be connected with the wireless network equipment, and after networking is realized, the MAC address of the wireless network equipment is compared with the false MAC address stored in the first blacklist database, so that the risk of connecting the terminal equipment with the wireless network equipment is further reduced.
In an embodiment of the present invention, after storing the determined false MAC address in the first blacklist database and the second blacklist database, the method further includes:
determining whether a rule for verifying the validity of the MAC address of the wireless network equipment changes;
if the data state of the determined false MAC address is not changed, determining the data state of the determined false MAC address as an effective state, and storing the information of the effective state into a first blacklist database and a second blacklist database;
and if the MAC address changes, determining the data state of the determined false MAC address as an invalid state, and skipping to execute validity verification on the MAC address of the wireless network equipment.
In the embodiment of the invention, because different legitimacy verification rules determine whether the MAC address is a false MAC address, when one legitimacy verification rule is adopted, the batch of MAC addresses may be false MAC addresses, but when another legitimacy verification rule is adopted, part or all of the batch of MAC addresses may not be false MAC addresses. Therefore, it is necessary to determine whether a rule for performing validity verification on the MAC address of the wireless network device changes, so that validity and authenticity of the validity verification can be guaranteed.
In the embodiment of the invention, the MAC address of the wireless network equipment to be verified is acquired, then the validity verification is carried out on the MAC address of the wireless network equipment, if the verification is true, the wireless network equipment is connected, if the verification is false, the MAC address of the wireless network equipment is determined to be a false MAC address, and thus the uniqueness of the MAC address is utilized to carry out the validity verification, so that the validity of the wireless network equipment can be effectively verified.
As shown in fig. 2 and fig. 3, an embodiment of the present invention provides a device where a verification apparatus for verifying the validity of a wireless network device is located and a verification apparatus for verifying the validity of a wireless network device. The device embodiments may be implemented by software, or by hardware, or by a combination of hardware and software. From a hardware level, as shown in fig. 2, a hardware structure diagram of a device in which a validation apparatus for verifying the validity of a wireless network device provided in the embodiment of the present invention is located is shown, where in addition to the processor, the memory, the network interface, and the nonvolatile memory shown in fig. 2, the device in which the apparatus is located in the embodiment may also include other hardware, such as a forwarding chip responsible for processing a packet, and the like. Taking a software implementation as an example, as shown in fig. 3, as a logical apparatus, the apparatus is formed by reading, by a CPU of a device in which the apparatus is located, corresponding computer program instructions in a non-volatile memory into a memory for execution.
As shown in fig. 3, the apparatus for verifying the validity of a wireless network device provided in this embodiment includes:
an obtaining module 301, configured to obtain an MAC address of a wireless network device to be verified;
a verification module 302 configured to perform the following operations:
verifying the validity of the MAC address of the wireless network equipment;
if the verification is true, connecting the wireless network equipment;
if the verification is false, determining the MAC address of the wireless network device as a false MAC address.
In the embodiment of the present invention, the obtaining module 301 may be configured to perform step 101 in the above-described method embodiment, and the verifying module 302 may be configured to perform step 102 in the above-described method embodiment.
In an embodiment of the present invention, the verification module 302 is configured to perform the following operations:
determining whether a least significant bit of a first byte from left to right of a MAC address of the wireless network device is 0 and a second least significant bit is 0;
if the verification is true, connecting the wireless network device, including:
connecting the wireless network device if the least significant bit is 0 and the second least significant bit is 0;
if the verification is false, determining the MAC address of the wireless network device as a false MAC address, including:
if the least significant bit is not 0, determining the MAC address of the wireless network device as a false MAC address.
In one embodiment of the present invention, further comprising:
the system comprises a creating module, a judging module and a judging module, wherein the creating module is used for creating a first blacklist database, and the first blacklist database is used for storing false MAC addresses verified by a plurality of users;
the comparison module is used for executing the following operations:
comparing the MAC address of the wireless network equipment with the false MAC address stored in the first blacklist database;
disconnecting the wireless network device if a false MAC address exists that is the same as the MAC address of the wireless network device;
if the false MAC address identical to the MAC address of the wireless network equipment does not exist, skipping to execute validity verification on the MAC address of the wireless network equipment, and when the MAC address of the wireless network equipment is determined to be the false MAC address, storing the determined false MAC address into the first blacklist database.
In one embodiment of the present invention, further comprising:
a determination module to perform the following operations:
determining whether a rule for verifying the validity of the MAC address of the wireless network equipment changes;
if the data state of the determined false MAC address is not changed, determining the data state of the determined false MAC address as an effective state, and storing the information of the effective state into the first blacklist database;
and if the MAC address changes, determining the data state of the determined false MAC address as an invalid state, and skipping to execute validity verification on the MAC address of the wireless network equipment.
In one embodiment of the present invention, further comprising:
the system comprises a creating module, a judging module and a judging module, wherein the creating module is used for creating a first blacklist database and a second blacklist database, the first blacklist database is used for storing false MAC addresses verified by a plurality of users, and the second blacklist database is used for storing a false MAC address verified by a user;
the comparison module is used for executing the following operations:
comparing the MAC address of the wireless network equipment with the false MAC address stored in the second blacklist database;
if a false MAC address exists in the second blacklist database and is the same as the MAC address of the wireless network equipment, disconnecting the wireless network equipment;
if the false MAC address which is the same as the MAC address of the wireless network equipment does not exist in the second blacklist database, comparing the MAC address of the wireless network equipment with the false MAC address stored in the first blacklist database;
if a false MAC address exists in the first blacklist database and is the same as the MAC address of the wireless network equipment, disconnecting the wireless network equipment;
if the false MAC address which is the same as the MAC address of the wireless network equipment does not exist in the first blacklist database, skipping to carry out validity verification on the MAC address of the wireless network equipment, and when the MAC address of the wireless network equipment is determined to be the false MAC address, storing the determined false MAC address into the first blacklist database and the second blacklist database.
In one embodiment of the present invention, further comprising:
a determination module to perform the following operations:
determining whether a rule for verifying the validity of the MAC address of the wireless network equipment changes;
if the data state of the determined false MAC address is not changed, determining the data state of the determined false MAC address as an effective state, and storing the information of the effective state into the first blacklist database and the second blacklist database;
and if the MAC address changes, determining the data state of the determined false MAC address as an invalid state, and skipping to execute validity verification on the MAC address of the wireless network equipment.
In an embodiment of the present invention, the obtaining module 301 is configured to perform the following operations:
calling an application program interface of wireless network equipment to be verified, wherein the application program interface is used for connecting the storage position of the MAC address of the wireless network equipment;
and acquiring the MAC address of the wireless network equipment.
It is to be understood that the schematic structure in the embodiment of the present invention does not form a specific limitation to the device for verifying the validity of the wireless network device. In other embodiments of the invention, the means for verifying the legitimacy of the wireless network device may comprise more or fewer components than those shown, or some components may be combined, some components may be split, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
Because the content of information interaction, execution process, and the like among the modules in the device is based on the same concept as the method embodiment of the present invention, specific content can be referred to the description in the method embodiment of the present invention, and is not described herein again.
The embodiment of the invention also provides a device for verifying the validity of the wireless network equipment, which comprises the following steps: at least one memory and at least one processor;
the at least one memory to store a machine readable program;
the at least one processor is configured to invoke the machine-readable program to perform a method for verifying the validity of a wireless network device according to any embodiment of the present invention.
Embodiments of the present invention also provide a computer-readable medium storing instructions for causing a computer to perform a method for verifying the legitimacy of a wireless network device as described herein. Specifically, a method or an apparatus equipped with a storage medium on which a software program code that realizes the functions of any of the above-described embodiments is stored may be provided, and a computer (or a CPU or MPU) of the method or the apparatus is caused to read out and execute the program code stored in the storage medium.
In this case, the program code itself read from the storage medium can realize the functions of any of the above-described embodiments, and thus the program code and the storage medium storing the program code constitute a part of the present invention.
Examples of the storage medium for supplying the program code include a floppy disk, a hard disk, a magneto-optical disk, an optical disk (e.g., CD-ROM, CD-R, CD-RW, DVD-ROM, DVD-RAM, DVD-RW, DVD + RW), a magnetic tape, a nonvolatile memory card, and a ROM. Alternatively, the program code may be downloaded from a server computer by a communications network.
Further, it should be clear that the functions of any one of the above-described embodiments can be realized not only by executing the program code read out by the computer but also by causing an operation method or the like operating on the computer based on instructions of the program code to perform a part or all of the actual operations.
Further, it is to be understood that the program code read out from the storage medium is written to a memory provided in an expansion board inserted into the computer or to a memory provided in an expansion unit connected to the computer, and then a CPU or the like mounted on the expansion board or the expansion unit is caused to perform part or all of the actual operations based on instructions of the program code, thereby realizing the functions of any of the embodiments described above.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.
Claims (2)
1. The method for verifying the validity of the wireless network equipment is characterized by comprising the following steps:
acquiring an MAC address of wireless network equipment to be verified;
verifying the validity of the MAC address of the wireless network equipment;
if the verification is true, connecting the wireless network equipment;
if the verification is false, determining the MAC address of the wireless network equipment as a false MAC address;
the method comprises the following steps:
determining whether a least significant bit of a first byte from left to right of a MAC address of the wireless network device is 0 and whether a second least significant bit of the MAC address is 0;
if the verification is true, connecting the wireless network device, including:
connecting the wireless network device if the least significant bit is 0 and the second least significant bit is 0;
if the verification is false, determining the MAC address of the wireless network device as a false MAC address, including:
if the least significant bit is not 0, determining the MAC address of the wireless network device as a false MAC address;
further comprising:
creating a first blacklist database, wherein the first blacklist database is used for storing false MAC addresses verified by a plurality of users;
after the determining the MAC address of the wireless network device as a false MAC address, further comprising:
comparing the MAC address of the wireless network equipment with the false MAC address stored in the first blacklist database;
disconnecting the wireless network device if a false MAC address exists that is the same as the MAC address of the wireless network device;
if the false MAC address identical to the MAC address of the wireless network equipment does not exist, skipping to execute validity verification on the MAC address of the wireless network equipment, and storing the determined false MAC address into the first blacklist database when the MAC address of the wireless network equipment is determined to be the false MAC address;
after the storing the determined false MAC address in the first blacklist database, further comprising:
determining whether a rule for verifying the validity of the MAC address of the wireless network equipment changes;
if the data state of the determined false MAC address is not changed, determining the data state of the determined false MAC address as an effective state, and storing the information of the effective state into the first blacklist database;
if the MAC address changes, determining the data state of the determined false MAC address as an invalid state, and skipping to execute validity verification on the MAC address of the wireless network equipment;
further comprising:
creating a first blacklist database and a second blacklist database, wherein the first blacklist database is used for storing false MAC addresses verified by a plurality of users, and the second blacklist database is used for storing a false MAC address verified by a user;
after the determining the MAC address of the wireless network device as a false MAC address, further comprising:
comparing the MAC address of the wireless network equipment with the false MAC address stored in the second blacklist database;
if a false MAC address exists in the second blacklist database and is the same as the MAC address of the wireless network equipment, disconnecting the wireless network equipment;
if the false MAC address which is the same as the MAC address of the wireless network equipment does not exist in the second blacklist database, comparing the MAC address of the wireless network equipment with the false MAC address stored in the first blacklist database;
if a false MAC address exists in the first blacklist database and is the same as the MAC address of the wireless network equipment, disconnecting the wireless network equipment;
if the first blacklist database does not have a false MAC address which is the same as the MAC address of the wireless network equipment, skipping to execute validity verification on the MAC address of the wireless network equipment, and when the MAC address of the wireless network equipment is determined to be the false MAC address, storing the determined false MAC address into the first blacklist database and the second blacklist database;
after the storing the determined false MAC address in the first blacklist database and the second blacklist database, further comprising:
determining whether a rule for verifying the validity of the MAC address of the wireless network equipment changes;
if the data state of the determined false MAC address is not changed, determining the data state of the determined false MAC address as an effective state, and storing the information of the effective state into the first blacklist database and the second blacklist database;
if the MAC address changes, determining the data state of the determined false MAC address as an invalid state, and skipping to execute validity verification on the MAC address of the wireless network equipment;
the acquiring the MAC address of the wireless network device to be verified includes:
calling an application program interface of wireless network equipment to be verified, wherein the application program interface is used for connecting the storage position of the MAC address of the wireless network equipment;
and acquiring the MAC address of the wireless network equipment.
2. A computer readable medium having computer instructions stored thereon, which when executed by a processor, cause the processor to perform the method of claim 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011541388.8A CN112671765B (en) | 2020-12-23 | 2020-12-23 | Method and device for verifying validity of wireless network equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011541388.8A CN112671765B (en) | 2020-12-23 | 2020-12-23 | Method and device for verifying validity of wireless network equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112671765A CN112671765A (en) | 2021-04-16 |
CN112671765B true CN112671765B (en) | 2022-09-06 |
Family
ID=75409140
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011541388.8A Active CN112671765B (en) | 2020-12-23 | 2020-12-23 | Method and device for verifying validity of wireless network equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112671765B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113904857A (en) * | 2021-10-17 | 2022-01-07 | 济南浪潮数据技术有限公司 | Method, device and equipment for filtering data packets in local area network and readable medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107743154A (en) * | 2017-10-18 | 2018-02-27 | 上海兴容信息技术有限公司 | A kind of tracking and attendance checking system and its method based on Wi Fi intelligent terminals |
CN111629374A (en) * | 2020-06-01 | 2020-09-04 | 佳都新太科技股份有限公司 | Physical address identification method and device, computer equipment and storage medium |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7995994B2 (en) * | 2006-09-22 | 2011-08-09 | Kineto Wireless, Inc. | Method and apparatus for preventing theft of service in a communication system |
CN101394275B (en) * | 2007-09-19 | 2011-08-03 | 华为技术有限公司 | Method, system and device implementing routing safety |
CN105101209A (en) * | 2015-08-24 | 2015-11-25 | 山西朗众信息技术有限公司 | Wireless router access method and wireless router access system |
CN105792205A (en) * | 2016-03-03 | 2016-07-20 | 广东顺德中卡云网络科技有限公司 | Method for client to initiate verification of access point validity |
CN107040922B (en) * | 2016-05-05 | 2019-11-26 | 腾讯科技(深圳)有限公司 | Wireless network connecting method, apparatus and system |
KR101999148B1 (en) * | 2017-07-28 | 2019-07-11 | (주)씨드젠 | System and method for detecting rogue access point and user device and computer program for the same |
CN107623754B (en) * | 2017-09-28 | 2020-07-10 | 武汉虹旭信息技术有限责任公司 | WiFi acquisition system and method based on authenticity MAC identification |
CN108540979A (en) * | 2018-04-04 | 2018-09-14 | 北京邮电大学 | Pseudo- AP detection method and device based on fingerprint characteristic |
-
2020
- 2020-12-23 CN CN202011541388.8A patent/CN112671765B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107743154A (en) * | 2017-10-18 | 2018-02-27 | 上海兴容信息技术有限公司 | A kind of tracking and attendance checking system and its method based on Wi Fi intelligent terminals |
CN111629374A (en) * | 2020-06-01 | 2020-09-04 | 佳都新太科技股份有限公司 | Physical address identification method and device, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN112671765A (en) | 2021-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101956486B1 (en) | Method and system for facilitating terminal identifiers | |
CN110278192B (en) | Method and device for accessing intranet by extranet, computer equipment and readable storage medium | |
CN106878250B (en) | Cross-application single-state login method and device | |
CN112950236B (en) | Sequence number writing method, device and computer readable medium | |
CN111258756B (en) | Load balancing method, device, computer equipment and readable storage medium | |
CN112671765B (en) | Method and device for verifying validity of wireless network equipment | |
CN112511523A (en) | Network security control method based on access control | |
CN111585973A (en) | Method and device for managing access | |
CN108600259B (en) | Authentication and binding method of equipment, computer storage medium and server | |
CN103559430B (en) | application account management method and device based on Android system | |
CN107809758B (en) | SIM card information protection method and device | |
CN109063461B (en) | Third-party password-free login method and system | |
CN113922972B (en) | Data forwarding method and device based on MD5 identification code | |
CN113849802A (en) | Equipment authentication method and device, electronic equipment and storage medium | |
CN117834312B (en) | Network access method, network access device, and computer-readable storage medium | |
CN107257556A (en) | Verify method, system and the platform of user's loCal number | |
CN114386047A (en) | Application vulnerability detection method and device, electronic equipment and storage medium | |
CN112732676A (en) | Data migration method, device, equipment and storage medium based on block chain | |
CN114172714A (en) | Account access authority control method and device and electronic equipment | |
CN112347486A (en) | Code vulnerability examination method and device for realizing privacy protection and readable medium | |
CN109145645B (en) | Method for protecting short message verification code in android mobile phone | |
KR20100114254A (en) | Method for certifying terminal application in smart card and system thereof | |
JP2006140881A (en) | Network identifier generation device with authenticating information and apparatus authenticating device | |
CN105099708B (en) | A kind of auth method | |
CN111741465A (en) | Soft SIM protection method and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |