-
1.
公开(公告)号:US20180324200A1
公开(公告)日:2018-11-08
申请号:US15775185
申请日:2016-11-28
Applicant: Samsung Electronics Co., Ltd.
Inventor: Daesung CHOI , Sungjun PARK , Chulhoon HWANG
Abstract: The present disclosure relates to a method for blocking the connection of an electronic device inside a wireless intrusion prevention system, the method comprising the steps of: successively monitoring wireless frames in a plurality of channels through a first communication module; generating a first blocking message on the basis of at least one wireless frame received as a result of the monitoring and generating a second blocking message on the basis of a first wireless frame, to which a predetermined wireless network technology has been applied, among the at least one wireless frame; and transmitting at least one of the first and second blocking messages through a second communication module. The present disclosure is not limited to the above embodiment, and other embodiments are also possible.
-
公开(公告)号:US20210204135A1
公开(公告)日:2021-07-01
申请号:US17057848
申请日:2019-05-28
Applicant: SAMSUNG ELECTRONICS CO., LTD.
Inventor: Jungil CHO , Soonhong KWON , Hyunwoo KIM , Minkyu SONG , Jongsung LEE , Joonghwan LEE , Yongsu CHUNG , Daesung CHOI
IPC: H04W12/122 , H04W12/73 , H04W12/02 , H04W12/61
Abstract: A method of identifying a malicious AP by a terminal apparatus includes obtaining first performance information related to hardware of a first AP based on a first beacon signal received from the first AP, comparing the first performance information with previously stored second performance information of a second AP, and determining whether the first AP is a malicious AP, based on a result of the comparing.
-
公开(公告)号:US20230016491A1
公开(公告)日:2023-01-19
申请号:US17949711
申请日:2022-09-21
Applicant: SAMSUNG ELECTRONICS CO., LTD.
Inventor: Jungil CHO , Soonhong KWON , Hyunwoo KIM , Minkyu SONG , Jongsung LEE , Joonghwan LEE , Yongsu CHUNG , Daesung CHOI
IPC: H04W12/122 , H04W12/61 , H04W12/02 , H04W12/73
Abstract: A method of identifying a malicious access point (AP) by a terminal apparatus includes obtaining first performance information related to hardware of a first AP based on a first beacon signal received from the first AP, comparing the first performance information with previously stored second performance information of a second AP, and determining whether the first AP is a malicious AP, based on a result of the comparing.
-
-