CN104244245B - A kind of wireless access authentication method, wireless routing device and wireless terminal - Google Patents
A kind of wireless access authentication method, wireless routing device and wireless terminal Download PDFInfo
- Publication number
- CN104244245B CN104244245B CN201410466979.1A CN201410466979A CN104244245B CN 104244245 B CN104244245 B CN 104244245B CN 201410466979 A CN201410466979 A CN 201410466979A CN 104244245 B CN104244245 B CN 104244245B
- Authority
- CN
- China
- Prior art keywords
- wireless
- routing device
- ssid
- wireless routing
- wireless terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The present invention is applied to the communications field, there is provided a kind of wireless access authentication method, wireless routing device and wireless terminal.Methods described includes:Wireless routing device includes Quick Response Code corresponding to the first SSID on the screen of wireless routing device, to access wireless routing device by the first SSID by wireless terminal;Wireless routing device generates the key of encryption at random;Wireless routing device sends key to wireless terminal;The 2nd SSID and password are encrypted according to key for wireless routing device;Wireless routing device includes the 2nd SSID after encryption and password on the screen of wireless routing device in the form of Quick Response Code, to initiate to wireless routing device the connection request to wireless network corresponding to the 2nd SSID after being decrypted from wireless terminal by the 2nd SSID and password.The present invention is authenticated without the input by complexity, and authentication efficiency is high, and user is easy to operate, quick.In addition, it is safe and reliable, effectively wireless network can be prevented to be stolen.Furthermore very simple is realized, is easily promoted.
Description
Technical field
The invention belongs to the communications field, more particularly to a kind of wireless access authentication method, wireless routing device and wireless end
End.
Background technology
, it is necessary to which user is manually entered wirelessly by wireless terminal when the wireless terminal of prior art needs to access wireless network
The wireless network name of routing device and password are authenticated, therefore authentication efficiency is low, user's complex operation.Further, since
As long as user have input the wireless network name and password of correct wireless routing device by wireless terminal, it is possible to by recognizing
Card, wireless network is accessed, and disabled user is the wireless network name and password for being easy to steal wireless routing device, therefore
Manually inputting the mode to be authenticated easily causes wireless network to be stolen.
The content of the invention
It is an object of the invention to provide a kind of wireless access authentication method, wireless routing device and wireless terminal, it is intended to
Solve user and wireless network name and the password of wireless routing device are manually entered to be authenticated by wireless terminal, certification effect
Rate is low, user's complex operation, and easy the problem of causing wireless network to be stolen.
In a first aspect, the invention provides a kind of wireless access authentication method, methods described includes:
Wireless routing device includes Quick Response Code corresponding to first service set identifier SSID the screen in wireless routing device
On, to access wireless routing device by the first SSID by wireless terminal;
Wireless routing device generates the key of encryption at random;
Wireless routing device sends the key to wireless terminal;
The 2nd SSID and password are encrypted according to the key for wireless routing device;
Wireless routing device includes the 2nd SSID after encryption and password in wireless routing device in the form of Quick Response Code
On screen, to be initiated by the 2nd SSID and password to the wireless routing device to second after being decrypted from wireless terminal
The connection request of wireless network corresponding to SSID.
Second aspect, the invention provides a kind of wireless access authentication method, methods described includes:
Wireless terminal scans Quick Response Code corresponding to the first SSID shown on the screen of wireless routing device by camera;
Wireless terminal accesses wireless routing device by the first SSID, after wireless terminal access, does not access wireless
The authority of network;
Wireless terminal by camera scan wireless routing device screen on show encrypted by key after second
Quick Response Code corresponding to SSID and password, the key are generated at random by wireless routing device;
Wireless terminal is entered using the key that wireless routing device is sent to the 2nd SSID after the encryption and password
Row decryption, obtains the 2nd SSID and password;
Wireless terminal is initiated to corresponding to the 2nd SSID by the 2nd SSID and password to the wireless routing device
The connection request of wireless network.
The third aspect, the invention provides a kind of wireless routing device, the wireless routing device includes:
First display module, for Quick Response Code corresponding to first service set identifier SSID to be included in wireless routing device
On screen, to access wireless routing device by the first SSID by wireless terminal;
Key production module, for generating the key of encryption at random;
Sending module, for sending the key to wireless terminal;
Encrypting module, for the 2nd SSID and password to be encrypted according to the key;
Second display module, for including setting the 2nd SSID after encryption and password in wireless routing in the form of Quick Response Code
On standby screen, to be initiated by the 2nd SSID and password to the wireless routing device to the after being decrypted from wireless terminal
The connection request of wireless network corresponding to two SSID.
Fourth aspect, the invention provides a kind of wireless terminal, the wireless terminal includes:
First scan module, the first SSID shown on the screen by camera scanning wireless routing device are corresponding
Quick Response Code;
AM access module, for accessing wireless routing device by the first SSID, after wireless terminal access, do not access
The authority of wireless network;
Second scan module, what is shown on the screen by camera scanning wireless routing device is encrypted by key
Quick Response Code corresponding to the 2nd SSID and password afterwards, the key are generated at random by wireless routing device;
Deciphering module, for using the key that wireless routing device is sent to the 2nd SSID after the encryption and close
Code is decrypted, and obtains the 2nd SSID and password;
Connection request module, for being initiated by the 2nd SSID and password to the wireless routing device to second
The connection request of wireless network corresponding to SSID.
In the present invention, because the 2nd SSID after the first SSID, encryption and password are shown in the form of Quick Response Code
On the screen of wireless routing device, so that wireless terminal is by scanning the 2nd SSID and password after obtaining the first SSID, encryption,
Therefore it is authenticated without the input by complexity, authentication efficiency is high, and user is easy to operate, quick.Further, since need nothing
Line terminal and wireless routing device complete authentication information interaction face-to-face, and wireless routing device is according to key to the 2nd SSID and close
Code is encrypted, and the 2nd SSID after the encryption and password are decrypted using the key for wireless terminal, obtain second
SSID and password, and can illegally be accessed by mac address filter, therefore securely and reliably, effectively wireless network can be prevented to be stolen.
Furthermore because wireless terminal can utilize existing popular software, without adding the work specially analyzed 2 D code information and forwarded
Tool, you can send authentication information to wireless routing device, therefore realize very simple, easily promote.
Brief description of the drawings
Fig. 1 is the communication process schematic diagram for the wireless access authentication method that the embodiment of the present invention one provides.
Fig. 2 is the flow chart for the wireless access authentication method that the embodiment of the present invention one provides.
Fig. 3 is in the wireless access authentication method that the embodiment of the present invention one provides, wireless routing device and wireless terminal it
Between carry out authentication communication process schematic diagram.
Fig. 4 is in the wireless access authentication method that the embodiment of the present invention one provides, wireless routing device and wireless terminal it
Between carry out authentication flow chart.
Fig. 5 is the structural representation for the wireless routing device that the embodiment of the present invention two provides.
Fig. 6 is the structural representation for the wireless terminal that the embodiment of the present invention three provides.
Embodiment
In order that the purpose of the present invention, technical scheme and beneficial effect are more clearly understood, below in conjunction with accompanying drawing and implementation
Example, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only explaining this hair
It is bright, it is not intended to limit the present invention.
In order to illustrate technical solutions according to the invention, illustrated below by specific embodiment.
Embodiment one:
Fig. 1 and Fig. 2 are referred to, the wireless access authentication method that the embodiment of the present invention one provides comprises the following steps:
(Service Set Identifier, service set is that is, wireless by the first SSID for S101, wireless routing device
The title of network) corresponding to Quick Response Code be shown on the screen of wireless routing device.
In the embodiment of the present invention one, before S101, methods described can also comprise the following steps:
Wireless routing device, which pre-sets acquiescence, allows wireless terminal to access wireless routing device by the first SSID,
But without the authority for accessing wireless network.
Or
In the embodiment of the present invention one, after S101, methods described can also comprise the following steps:
Wireless routing device sets interim permission wireless terminal to access wireless routing device by the first SSID, but does not have
There is the authority for accessing wireless network.
S102, wireless terminal are scanned the first SSID shown on the screen of wireless routing device by camera and corresponded to
Quick Response Code;
In the embodiment of the present invention one, S102 is specifically as follows:
Wireless terminal scans wireless routing device using the Quick Response Code barcode scanning instrument built in application software by camera
Quick Response Code corresponding to the first SSID shown on screen.
S103, wireless terminal access wireless routing device by the first SSID, after wireless terminal access, do not access
The authority of wireless network;
In the embodiment of the present invention one, after S103, methods described can also comprise the following steps:
Authentication is carried out between wireless routing device and wireless terminal, certification is by rear, execution S104.
Fig. 3 and Fig. 4 are referred to, authentication is carried out between the wireless routing device and wireless terminal can specifically include
Following steps:
S201, wireless terminal send authentication request message to wireless routing device, and the authentication request message carries nothing
The unique identifier ClientID of line terminal and random generation data X encrypted result EKs[X], it is close used in encryption data X
Key Ks is shared with wireless routing device, is calculated by wireless terminal;
S202, wireless routing device receive the authentication request message that wireless terminal is sent;
S203, wireless routing device are using key Ks to the encrypted result EKs[X] is decrypted to obtain data X, then
X+D is encrypted using key Ks to obtain EKs[X+D], meanwhile, it is random to generate data Y, data Y is added using key Ks
It is close, obtain EKs[Y];Wherein, D is wireless routing device and the fixed value of wireless terminal agreement;
S204, wireless routing device send response message to wireless terminal, and the response message carries wireless routing device
Unique identifier RouterID and encryption after data EKs[Y] and EKs[X+D];
The response message that S205, wireless terminal reception wireless routing device are sent;
S206, wireless terminal are using key Ks to data EKs[Y] and EKs[X+D] is decrypted, and calculates X+Y value, so
Ks is reused afterwards the result X+Y of calculating is encrypted, obtain encrypted result EKs[X+Y];
S207, wireless terminal are by encrypted result EKs[X+Y] is sent to wireless routing device;
S208, wireless routing device receive encrypted result EKs[X+Y];
S209, wireless routing device are using key Ks to encrypted result EKs[X+Y] is decrypted, and then verifies result of calculation
It is whether correct.If result of calculation is correct, then it represents that then certification is by performing S104.
Above-mentioned authentication procedures can prevent network intercepting, Replay Attack, password conjecture, the attack of tracking address etc..
S104, wireless routing device generate the key of encryption at random;
S105, wireless routing device send the key to wireless terminal;The data division of all messages is all after this
It can be encrypted by the key;
S106, wireless routing device obtain MAC (Media Access Control, the medium visit of the wireless terminal of access
Ask control) address;
In the embodiment of the present invention one, S106 can also be performed after S103.
In the embodiment of the present invention one, after S106, methods described can also comprise the following steps:
Wireless routing device, which is set, does not allow wireless terminal to access wireless routing device by the first SSID.
The 2nd SSID and password are encrypted according to the key for S107, wireless routing device.
The 2nd SSID after encryption and password are included setting in wireless routing by S108, wireless routing device in the form of Quick Response Code
On standby screen;
S109, wireless terminal scan the 2nd SSID after the encryption shown on the screen of wireless routing device by camera
With password corresponding to Quick Response Code;
In the embodiment of the present invention one, S109 is specifically as follows:
Wireless terminal scans wireless routing device using the Quick Response Code barcode scanning instrument built in application software by camera
Quick Response Code corresponding to the 2nd SSID and password after the encryption shown on screen.
The 2nd SSID after the encryption and password are decrypted using the key for S110, wireless terminal, obtain
Two SSID and password.
S111, wireless terminal are initiated to the 2nd SSID pairs by the 2nd SSID and password to the wireless routing device
The connection request for the wireless network answered.
S112, wireless routing device according to the request, judge to initiate the wireless terminal of connection request MAC Address whether
It is the MAC Address got before, if it is, allowing the wireless terminal for initiating connection request to access nothing corresponding to the 2nd SSID
Gauze network.
In the embodiment of the present invention one, because the 2nd SSID after the first SSID, encryption and password are with Quick Response Code shape
Formula is shown on the screen of wireless routing device, so that wireless terminal is by scanning second after obtaining the first SSID, encryption
SSID and password, therefore without being authenticated by complicated input, authentication efficiency is high, user is easy to operate, quick.Separately
Outside, due to needing wireless terminal and wireless routing device to complete authentication information interaction face-to-face, wireless routing device is according to key
2nd SSID and password are encrypted, wireless terminal is carried out using the key to the 2nd SSID after the encryption and password
Decryption, obtains the 2nd SSID and password, and can illegally be accessed by mac address filter, therefore securely and reliably, can effectively prevent nothing
Gauze network is stolen.Furthermore because wireless terminal can utilize existing popular software, without adding specially to 2 D code information point
Analysis and the instrument of forwarding, you can send authentication information to wireless routing device, therefore realize very simple, easily promote.
Embodiment two:
Referring to Fig. 5, the wireless routing device that the embodiment of the present invention two provides includes:First display module 11, key life
Into module 12, sending module 13, the display module 15 of encrypting module 14 and second, wherein,
First display module 11, for Quick Response Code corresponding to first service set identifier SSID to be included in wireless routing device
Screen on, with by wireless terminal pass through the first SSID access wireless routing device;
Key production module 12, for generating the key of encryption at random;
Sending module 13, for sending the key to wireless terminal;
Encrypting module 14, for the 2nd SSID and password to be encrypted according to the key;
Second display module 15, for the 2nd SSID after encryption and password to be included in wireless routing in the form of Quick Response Code
On the screen of equipment, to be initiated pair to the wireless routing device by the 2nd SSID and password after being decrypted from wireless terminal
The connection request of wireless network corresponding to 2nd SSID.
In the embodiment of the present invention two, the wireless routing device can also include:
Acquisition module, the medium access control MAC Address of the wireless terminal for obtaining access;
Judge module, for according to the request, whether the MAC Address for judging to initiate the wireless terminal of connection request to be it
Before the MAC Address that gets;
AM access module, for if the MAC Address that the judge module judges to initiate the wireless terminal of connection request is
The MAC Address got before, then the wireless terminal for initiating connection request is allowed to access wireless network corresponding to the 2nd SSID.
In the embodiment of the present invention two, the wireless routing device can also include:
First authentication module, for carrying out authentication between wireless routing device and wireless terminal, certification passes through
Afterwards, by the key that generation is encrypted at random of key production module 12.
In the embodiment of the present invention two, the authentication module can specifically include:
First receiving module, for receiving the authentication request message of wireless terminal transmission, the authentication request message carries
The encrypted result E of the unique identifier of wireless terminal and random generation data XKs[X], key Ks used in encryption data X
It is shared with wireless routing device, is calculated by wireless terminal;
First encryption/decryption module, for using key Ks to the encrypted result EKs[X] is decrypted to obtain data X, so
X+D is encrypted using key Ks afterwards to obtain EKs[X+D], meanwhile, it is random to generate data Y, data Y is carried out using key Ks
Encryption, obtains EKs[Y];Wherein, D is wireless routing device and the fixed value of wireless terminal agreement;
First sending module, for sending response message to wireless terminal, the response message carries wireless routing device
Unique identifier RouterID and encryption after data EKs[Y] and EKs[X+D], to obtain encrypted result by wireless terminal
EKs[X+Y];
Second receiving module, for receiving encrypted result EKs[X+Y];
First deciphering module, for using key Ks to encrypted result EKs[X+Y] is decrypted, and then verifies result of calculation
It is whether correct, if result of calculation is correct, then it represents that certification passes through.
Embodiment three:
Referring to Fig. 6, the wireless terminal that the embodiment of the present invention three provides includes:First scan module 21, AM access module 22,
Second scan module 23, deciphering module 24 and connection request module 25, wherein,
First scan module 21, SSID couples of the first shown on the screen by camera scanning wireless routing device
The Quick Response Code answered;
AM access module 22, for accessing wireless routing device by the first SSID, after wireless terminal access, do not visit
Ask the authority of wireless network;
Second scan module 23, what is shown on the screen by camera scanning wireless routing device is added by key
Quick Response Code corresponding to the 2nd SSID and password after close, the key are generated at random by wireless routing device;
Deciphering module 24, for the key that is sent using wireless routing device to the 2nd SSID after the encryption and
Password is decrypted, and obtains the 2nd SSID and password;
Connection request module 25, for being initiated by the 2nd SSID and password to the wireless routing device to second
The connection request of wireless network corresponding to SSID.
In the embodiment of the present invention three, the wireless terminal also includes:
Second authentication module, for carrying out authentication between wireless terminal and wireless routing device.
In the embodiment of the present invention three, second authentication module can specifically include:
Second sending module, for sending authentication request message to wireless routing device, to be used by wireless routing device
Key Ks is to the encrypted result EKs[X] is decrypted to obtain data X, and then X+D is encrypted using key Ks to obtain EKs
[X+D], meanwhile, it is random to generate data Y, data Y is encrypted using key Ks, obtains EKs[Y];Wherein, D is wireless routing
The fixed value of equipment and wireless terminal agreement;The authentication request message carries the unique identifier ClientID of wireless terminal
With random generation data X encrypted result EKs[X], key Ks used in encryption data X are shared with wireless routing device,
It is calculated by wireless terminal;
3rd receiving module, for receiving the response message of wireless routing device transmission, the response message carries wireless
The unique identifier RouterID of the routing device and data E after encryptionKs[Y] and EKs[X+D];
Second encryption/decryption module, for using key Ks to data EKs[Y] and EKs[X+D] is decrypted, and calculates X+Y
Value, then reuse Ks and the result X+Y of calculating be encrypted, obtain encrypted result EKs[X+Y];
3rd sending module, for by encrypted result EKs[X+Y] is sent to wireless routing device, with by wireless routing device
Using key Ks to encrypted result EKs[X+Y] is decrypted, and then verifies whether result of calculation is correct.If result of calculation is correct,
Then represent that certification passes through.
Can be with one of ordinary skill in the art will appreciate that realizing that all or part of step in above-described embodiment method is
The hardware of correlation is instructed to complete by program, described program can be stored in a computer read/write memory medium,
Described storage medium, such as ROM/RAM, disk, CD.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
All any modification, equivalent and improvement made within refreshing and principle etc., should be included in the scope of the protection.
Claims (10)
1. a kind of wireless access authentication method, it is characterised in that methods described includes:
Wireless routing device includes Quick Response Code corresponding to the first SSID on the screen of wireless routing device, with by wireless terminal
Wireless routing device is accessed by the first SSID after scanning Quick Response Code, without the authority for accessing wireless network after access;
Wireless routing device generates the key of encryption at random;
Wireless routing device sends the key to wireless terminal;
The 2nd SSID and password are encrypted according to the key for wireless routing device;
Wireless routing device by the 2nd SSID after encryption and password in the form of Quick Response Code include wireless routing device screen
On, to be initiated from wireless terminal scanning Quick Response Code and after decrypting by the 2nd SSID and password to the wireless routing device
To the connection request of wireless network corresponding to the 2nd SSID.
2. the method as described in claim 1, it is characterised in that pass through described first after the wireless terminal scanning Quick Response Code
After SSID access wireless routing devices, methods described also includes:
Wireless routing device obtains the medium access control MAC Address of the wireless terminal of access;
The wireless terminal scans Quick Response Code and sent out after decrypting by the 2nd SSID and password to the wireless routing device
After rising to the connection request of wireless network corresponding to the 2nd SSID, methods described also includes:
For wireless routing device according to the request, whether the MAC Address for judging to initiate the wireless terminal of connection request is to obtain before
The MAC Address got, if it is, allowing the wireless terminal for initiating connection request to access wireless network corresponding to the 2nd SSID.
3. method as claimed in claim 1 or 2, it is characterised in that pass through described the after wireless terminal scanning Quick Response Code
After one SSID access wireless routing devices, methods described also includes:
Carry out authentication between wireless routing device and wireless terminal, certification by rear, perform the wireless routing device with
The key of machine generation encryption.
4. method as claimed in claim 3, it is characterised in that carry out identity between the wireless routing device and wireless terminal
Certification specifically includes:
Wireless routing device receives the authentication request message that wireless terminal is sent, and the authentication request message carries wireless terminal
Unique identifier and random generation data X encrypted result EKs| X |, key Ks used in encryption data X be with without circuit
By collaborative share, it is calculated by wireless terminal;
Wireless routing device is using key Ks to the encrypted result EKs| X | it is decrypted to obtain data X, then using key Ks
X+D is encrypted to obtain EKs| X+D |, meanwhile, it is random to generate data Y, data Y is encrypted using key Ks, obtains EKs
[Y];Wherein, D is wireless routing device and the fixed value of wireless terminal agreement;
Wireless routing device sends response message to wireless terminal, and the response message carries the unique mark of wireless routing device
Accord with the data E after RouterID and encryptionKs[Y] and EKs[X+D], to obtain encrypted result E by wireless terminalKs[X+Y];
Wireless routing device receives encrypted result EKs[X+Y];
Wireless routing device is using key Ks to encrypted result EKs[X+Y] is decrypted, and then verifies whether result of calculation is correct,
If result of calculation is correct, then it represents that certification passes through.
5. a kind of wireless access authentication method, it is characterised in that methods described includes:
Wireless terminal scans Quick Response Code corresponding to the first SSID shown on the screen of wireless routing device by camera;
Wireless terminal accesses wireless routing device by the first SSID, after wireless terminal access, does not access wireless network
Authority;
Wireless terminal by camera scan wireless routing device screen on show encrypted by key after the 2nd SSID
With password corresponding to Quick Response Code, the key generates at random by wireless routing device;
Wireless terminal is solved using the key that wireless routing device is sent to the 2nd SSID after the encryption and password
It is close, obtain the 2nd SSID and password;
Wireless terminal is initiated to wireless corresponding to the 2nd SSID by the 2nd SSID and password to the wireless routing device
The connection request of network.
6. method as claimed in claim 5, it is characterised in that the wireless terminal is accessed without circuit by the first SSID
After equipment, methods described also includes:
Carry out authentication between wireless terminal and wireless routing device, certification by rear, perform the wireless routing device with
The key of machine generation encryption.
7. method as claimed in claim 6, it is characterised in that carry out identity between the wireless terminal and wireless routing device
Certification specifically includes:
Wireless terminal sends authentication request message to wireless routing device, to be added by wireless routing device using key Ks to described
Close result EKs[X] is decrypted to obtain data X, and then X+D is encrypted using key Ks to obtain EKs[X+D], meanwhile, with
Machine generates data Y, and data Y is encrypted using key Ks, obtains EKs[Y];Wherein, D is wireless routing device and wireless end
Hold the fixed value of agreement;The authentication request message carries the unique identifier ClientID of wireless terminal and random generation number
According to X encrypted result EKs[X], key Ks used in encryption data X are shared with wireless routing device, are by wireless whole
What end was calculated;
The response message that wireless terminal reception wireless routing device is sent, the response message carry the unique of wireless routing device
The identifier RouterID and data E after encryptionKs[Y] and EKs[X+D];
Wireless terminal is using key Ks to data EKs[Y] and EKs[X+D] is decrypted, and calculates X+Y value, then reuses Ks
The result X+Y of calculating is encrypted, obtains encrypted result EKs[X+Y];
Wireless terminal is by encrypted result EKs[X+Y] is sent to wireless routing device, to use Ks pairs of key by wireless routing device
Encrypted result EKs[X+Y] is decrypted, and then verifies whether result of calculation is correct, if result of calculation is correct, then it represents that certification is led to
Cross.
8. a kind of wireless routing device, it is characterised in that the wireless routing device includes:
First display module, for Quick Response Code corresponding to the first SSID to be included to the screen in wireless routing device, with by nothing
Wireless routing device is accessed by the first SSID after line terminal scanning Quick Response Code, without access wireless network after access
Authority;
Key production module, for generating the key of encryption at random;
Sending module, for sending the key to wireless terminal;
Encrypting module, for the 2nd SSID and password to be encrypted according to the key;
Second display module, for the 2nd SSID after encryption and password to be included in wireless routing device in the form of Quick Response Code
On screen, with Quick Response Code is scanned from wireless terminal and after decrypting by the 2nd SSID and password to the wireless routing device
Initiate the connection request to wireless network corresponding to the 2nd SSID.
9. wireless routing device as claimed in claim 8, it is characterised in that the wireless routing device also includes:
Acquisition module, the medium access control MAC Address of the wireless terminal for obtaining access;
Judge module, for according to the request, whether the MAC Address for judging to initiate the wireless terminal of connection request to be to obtain before
The MAC Address got;
AM access module, for if the judge module judge initiate connection request wireless terminal MAC Address be before
The MAC Address got, then the wireless terminal for initiating connection request is allowed to access wireless network corresponding to the 2nd SSID.
10. a kind of wireless terminal, it is characterised in that the wireless terminal includes:
First scan module, on the screen for scanning wireless routing device by camera two corresponding to the first SSID that shows
Tie up code;
AM access module, for accessing wireless routing device by the first SSID, after wireless terminal access, do not access wireless
The authority of network;
Second scan module, after what is shown on the screen by camera scanning wireless routing device is encrypted by key
Quick Response Code corresponding to 2nd SSID and password, the key are generated at random by wireless routing device;
Deciphering module, for being entered using the key that wireless routing device is sent to the 2nd SSID after the encryption and password
Row decryption, obtains the 2nd SSID and password;
Connection request module, for being initiated by the 2nd SSID and password to the wireless routing device to the 2nd SSID pairs
The connection request for the wireless network answered.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410466979.1A CN104244245B (en) | 2014-09-12 | 2014-09-12 | A kind of wireless access authentication method, wireless routing device and wireless terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410466979.1A CN104244245B (en) | 2014-09-12 | 2014-09-12 | A kind of wireless access authentication method, wireless routing device and wireless terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104244245A CN104244245A (en) | 2014-12-24 |
CN104244245B true CN104244245B (en) | 2018-02-13 |
Family
ID=52231420
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410466979.1A Active CN104244245B (en) | 2014-09-12 | 2014-09-12 | A kind of wireless access authentication method, wireless routing device and wireless terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104244245B (en) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104980919B (en) * | 2015-05-13 | 2019-02-12 | 小米科技有限责任公司 | The acquisition methods and equipment of information of network service |
CN106304043A (en) * | 2015-05-20 | 2017-01-04 | 阿里巴巴集团控股有限公司 | A kind of distribution method, device, system, wireless terminal and wireless router |
CN105898747A (en) * | 2016-05-13 | 2016-08-24 | 中科创达软件科技(深圳)有限公司 | Wireless network security authentication method and device and wireless network access method and device |
CN105873036A (en) * | 2016-05-19 | 2016-08-17 | 郑建钦 | Safe AP (access point) information processing method |
CN106413047A (en) * | 2016-10-31 | 2017-02-15 | 北京小米移动软件有限公司 | Method and device for enabling intelligent device to be accessed to wireless network |
CN107995669B (en) * | 2017-11-29 | 2021-02-26 | 维沃移动通信有限公司 | Display method of wireless access point AP information and mobile terminal |
CN107949068A (en) * | 2017-12-08 | 2018-04-20 | 鸿合科技股份有限公司 | A kind of method and apparatus of wireless connection |
CN111669840B (en) * | 2019-03-05 | 2022-07-29 | 珠海奔图电子有限公司 | Network connection configuration method, network connection configuration device, and image forming apparatus |
US11977788B2 (en) | 2019-03-05 | 2024-05-07 | Zhuhai Pantum Electronics Co., Ltd. | Network connection configuration method, network connection configuration apparatus, image forming apparatus, and storage medium |
CN111726801B (en) * | 2019-03-20 | 2022-12-09 | 杭州九阳小家电有限公司 | Network security control method |
CN112383915B (en) * | 2020-12-02 | 2023-11-21 | 中国联合网络通信集团有限公司 | Wireless network access method, wireless access device and terminal |
CN113316146B (en) * | 2021-05-21 | 2022-07-12 | 中国联合网络通信集团有限公司 | Method, access point and terminal for providing network access service |
CN114189861B (en) * | 2021-11-24 | 2023-10-20 | 阿里巴巴(中国)有限公司 | Wireless network connection method, device and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1299095A (en) * | 2000-12-19 | 2001-06-13 | 天津南开戈德集团有限公司 | Portable POS system of wireless mobile network and its operation method |
CN102802155A (en) * | 2012-08-17 | 2012-11-28 | 珠海金山办公软件有限公司 | Method for rapidly establishing connection between mobile terminal and intelligent display equipment |
KR20120129249A (en) * | 2011-05-19 | 2012-11-28 | 부산대학교 산학협력단 | Method for setting up a WLAN connection and resolving the indoor locastion of a station using the QRQuick Response code and sound wave |
CN103179640A (en) * | 2013-03-25 | 2013-06-26 | 北京奇虎科技有限公司 | Wireless local area network access system and method |
CN103415013A (en) * | 2013-08-26 | 2013-11-27 | 南京市海聚信息科技有限公司 | Method and system for enabling WiFi terminal to have rapid access to WiFi AP |
CN103813474A (en) * | 2014-02-25 | 2014-05-21 | 罗建平 | Method for mobile terminal to be automatically connected with WLAN |
-
2014
- 2014-09-12 CN CN201410466979.1A patent/CN104244245B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1299095A (en) * | 2000-12-19 | 2001-06-13 | 天津南开戈德集团有限公司 | Portable POS system of wireless mobile network and its operation method |
KR20120129249A (en) * | 2011-05-19 | 2012-11-28 | 부산대학교 산학협력단 | Method for setting up a WLAN connection and resolving the indoor locastion of a station using the QRQuick Response code and sound wave |
CN102802155A (en) * | 2012-08-17 | 2012-11-28 | 珠海金山办公软件有限公司 | Method for rapidly establishing connection between mobile terminal and intelligent display equipment |
CN103179640A (en) * | 2013-03-25 | 2013-06-26 | 北京奇虎科技有限公司 | Wireless local area network access system and method |
CN103415013A (en) * | 2013-08-26 | 2013-11-27 | 南京市海聚信息科技有限公司 | Method and system for enabling WiFi terminal to have rapid access to WiFi AP |
CN103813474A (en) * | 2014-02-25 | 2014-05-21 | 罗建平 | Method for mobile terminal to be automatically connected with WLAN |
Also Published As
Publication number | Publication date |
---|---|
CN104244245A (en) | 2014-12-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104244245B (en) | A kind of wireless access authentication method, wireless routing device and wireless terminal | |
EP2522100B1 (en) | Secure multi-uim authentication and key exchange | |
CN101822082B (en) | Techniques for secure channelization between UICC and terminal | |
KR100843072B1 (en) | Wireless network system and communication method using wireless network system | |
JP6608339B2 (en) | Client device with authentication and associated method | |
EP3337088B1 (en) | Data encryption method, decryption method, apparatus, and system | |
CN105792194B (en) | Authentication method, authentication device, the network equipment, the Verification System of base station legitimacy | |
CN103415008A (en) | Encryption communication method and encryption communication system | |
CN101662765A (en) | Encryption system and method of short message of mobile telephone | |
CN108012266B (en) | Data transmission method and related equipment | |
CN101621794A (en) | Method for realizing safe authentication of wireless application service system | |
CN101990201B (en) | Method, system and device for generating general bootstrapping architecture (GBA) secret key | |
CN101895881B (en) | Method for realizing GBA secret key and pluggable equipment of terminal | |
KR101358375B1 (en) | Prevention security system and method for smishing | |
CN103973543A (en) | Method and device for instant messaging | |
CN109756451B (en) | Information interaction method and device | |
KR20130007097A (en) | Security system of smart phone service and secruity method | |
CN107493281A (en) | encryption communication method and device | |
CN102202291B (en) | Card-free terminal, service access method and system thereof, terminal with card and bootstrapping server function (BSF) | |
KR101172876B1 (en) | System and method for performing mutual authentication between user terminal and server | |
JP7404540B2 (en) | Privacy information transmission methods, devices, computer equipment and computer readable media | |
KR20130109560A (en) | Encryption method of database of mobile communication device | |
CN105635096A (en) | Data module access method, system and terminal | |
CN111065092A (en) | 5G communication information encryption and decryption method, equipment and storage medium | |
JP2007525123A (en) | Apparatus and method for authenticating a user accessing content stored in encrypted form on a storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |