US 12,133,080 B2
Terminal device and method for identifying malicious AP by using same
Jungil Cho, Suwon-si (KR); Soonhong Kwon, Suwon-si (KR); Hyunwoo Kim, Suwon-si (KR); Minkyu Song, Suwon-si (KR); Jongsung Lee, Suwon-si (KR); Joonghwan Lee, Suwon-si (KR); Yongsu Chung, Suwon-si (KR); and Daesung Choi, Suwon-si (KR)
Assigned to SAMSUNG ELECTRONICS CO., LTD., Suwon-si (KR)
Filed by SAMSUNG ELECTRONICS CO., LTD., Suwon-si (KR)
Filed on Sep. 21, 2022, as Appl. No. 17/949,711.
Application 17/949,711 is a continuation of application No. 17/057,848, granted, now 11,457,362, previously published as PCT/KR2019/006389, filed on May 28, 2019.
Claims priority of provisional application 62/677,117, filed on May 28, 2018.
Prior Publication US 2023/0016491 A1, Jan. 19, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/00 (2013.01); H04W 12/02 (2009.01); H04W 12/122 (2021.01); H04W 12/61 (2021.01); H04W 12/73 (2021.01)
CPC H04W 12/122 (2021.01) [H04W 12/02 (2013.01); H04W 12/61 (2021.01); H04W 12/73 (2021.01)] 16 Claims
OG exemplary drawing
 
1. A method of identifying a malicious access point (AP) by a terminal apparatus, the method comprising:
storing information on a first arrangement order of first information elements included in a first beacon signal of a first AP defined as the malicious AP, the first beacon signal including a first header and a first body having a first option field, the first information elements being included in the first option field;
receiving a second beacon signal from a second AP, the second beacon signal including a second header and a second body having a second option field, and second information elements being included in the second option field;
obtaining a second arrangement order of the second information elements included in the second option field of the second body of the second beacon signal by analyzing the received second beacon signal;
comparing the obtained second arrangement order of the second information elements included in the second option field of the second body of the second beacon signal with the first arrangement order of the first information elements included in the first option field of the first body of the first beacon signal; and
identifying the second AP as the malicious AP based on the second arrangement order being the same as the first arrangement order as a result of the comparing.