CN106572465A - Wireless connection method and system thereof - Google Patents

Wireless connection method and system thereof Download PDF

Info

Publication number
CN106572465A
CN106572465A CN201610909004.0A CN201610909004A CN106572465A CN 106572465 A CN106572465 A CN 106572465A CN 201610909004 A CN201610909004 A CN 201610909004A CN 106572465 A CN106572465 A CN 106572465A
Authority
CN
China
Prior art keywords
ssid
wireless
wireless network
default
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610909004.0A
Other languages
Chinese (zh)
Other versions
CN106572465B (en
Inventor
谈剑锋
王齐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Peoplenet Security Technology Co Ltd
Original Assignee
Shanghai Peoplenet Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Peoplenet Security Technology Co Ltd filed Critical Shanghai Peoplenet Security Technology Co Ltd
Priority to CN201610909004.0A priority Critical patent/CN106572465B/en
Publication of CN106572465A publication Critical patent/CN106572465A/en
Application granted granted Critical
Publication of CN106572465B publication Critical patent/CN106572465B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption

Abstract

The invention discloses a wireless connection method and a system thereof. The method comprises the following steps of stepS100, scanning and acquiring an unencrypted wireless network of a visible SSID; stepS300, according to the visible SSID, acquiring a hidden SSID of an encrypted wireless network; stepS400, through the hidden SSID, sending connection request information to a wireless router corresponding to the encrypted wireless network; and stepS500, when request passing information fed back by the wireless router is received, successfully accessing the encrypted wireless network. By using the wireless connection method and the system thereof, different services can be provided for a common user and a VIP user so that the VIP user acquires a better wireless network service, and a usage experience and satisfaction of the VIP user are greatly increased.

Description

A kind of wireless connection method and system
Technical field
The present invention relates to wireless communication field, more particularly to a kind of wireless connection method and system.
Background technology
With the development of science and technology, the equipment such as mobile phone, panel computer, notebook computer has become indispensable during we live Few article, in order to there is preferably experience, they are owned by wireless connecting function, and they can pass through Wi-Fi (Wireless-Fidelity, Wireless Fidelity) accesses wireless network, such that it is able to carry out internet communication.
Many non-encrypted wireless networks are had in present public arena, primarily to improve service quality, therefore, this A little non-encrypted wireless networks are typically provided by each businessman, market.For convenience the wireless terminal of client is connected into wireless network, this The SSID (Service Set Identifier, service set) of a little non-encrypted wireless networks is visible, and this is just meaned What is businessman and provide for all clients is all identical service, it is impossible to provide differentiated service according to different customers;And this Plant non-encrypted wireless network and typically all adopt WEB authentication modes, need the manual connection of client oneself, step is cumbersome.
The content of the invention
It is an object of the invention to provide a kind of wireless connection method and system, realize providing difference to different types of user The service of change, so as to improve the purpose of Consumer's Experience.
The technical scheme that the present invention is provided is as follows:
A kind of wireless connection method, including:The scanning of step S100 obtains the non-encrypted wireless network of visible SSID;Step S300 obtains encrypting the hiding SSID of wireless network according to the visible SSID;Step S400 is by the hiding SSID to institute State the corresponding wireless router of encryption wireless network and send connectivity request message;Step S500 ought receive wireless router feedback Request pass through information when, be successfully accessed the encryption wireless network.
User gradation is divided into into domestic consumer and VIP user's (it is also understood that nonregistered user and register user), is Domestic consumer's any wireless network services different with VIP user's offer, to reach the purpose for lifting VIP user experiences.In tool During body, wireless router provides a non-encrypted wireless network and encryption wireless network simultaneously, non-encrypted wireless network SSID is visible, facilitate all users connection use (including:Domestic consumer and VIP user), and encrypt wireless network SSID is hiding, it is meant that not all people can access this encryption wireless network, it is ensured that the use of VIP user Authority.The hiding SSID of the visible SSID of non-encrypted wireless network and encryption wireless network has corresponding relation, can be according to can See SSID, obtain hiding SSID, be easy to follow-up VIP user to connect by wireless terminal and encrypt wireless network, obtain excellentization Service.
Further, step S300 includes:Step S310 obtains corresponding according to the visible SSID and presetting database Default transformational rule;Wherein, the default transformational rule includes:Operational parameter and default transfer algorithm;Step S320 according to The visible SSID, the default transformational rule, obtain the hiding SSID of the encryption wireless network.
It can be seen that SSID and hiding SSID have corresponding relation, it can be understood as, hiding SSID is to after visible SSID encryptions Form, can obtain hiding SSID by default transfer algorithm and operational parameter, allow VIP user to be connected into encryption wireless network. This default transformational rule ensures that hiding SSID has certain encryption, reduces all users and cracks and obtains hiding SSID's May.
Further, step S310 includes:Step S311 obtains the operational parameter included in the visible SSID;Step S312 obtains the described default transfer algorithm in the presetting database;Wherein, the presetting database only includes a kind of described Default transfer algorithm;The default transfer algorithm is:Enciphered method is replaced, or, evolution method.
Operational parameter may be embodied in visible SSID, and default transfer algorithm can be stored in advance in presetting database In, because can only be stored with a kind of default transfer algorithm, and the operational parameter being included in visible SSID also only exists a kind of feelings Condition, therefore, only can obtain a hiding SSID, it is ensured that be correctly connected into the feasibility of encryption wireless network.
Further, step S310 includes:Step S313 obtains the operational parameter and calculation included in the visible SSID Method is identified;Step S314 finds corresponding default transfer algorithm according to algorithm mark in the presetting database;Its In, the presetting database includes at least one default transfer algorithm;Default conversion in the presetting database is calculated Method includes following at least one:Replace enciphered method, evolution method.
When be stored with simultaneously in presetting database various default transfer algorithms when, it is seen that not only can join comprising computing in SSID Number, also can identify comprising algorithm, and corresponding default transfer algorithm is found in presetting database using algorithm mark, obtain hidden Hide SSID.The storage of various default transfer algorithms further ensures hiding SSID and is difficult to be cracked, so as to ensure that offer difference The possibility of alienation any wireless network services.
Further, also include between step S100 and step S300:Step S200 judges whether to have access to The non-encrypted wireless network, if so, then execution step S300, if it is not, then not having the qualification of connection encryption wireless network, stands Terminate wireless connection.
Before carrying out being calculated hiding SSID, the identity of wireless terminal is also determined whether, if wireless terminal connects Non-encrypted wireless network all cannot be connected, then it just less qualified can even encrypt wireless network, the setting resistance of this step The possibility that some wireless terminals in blacklist are connected into encryption wireless network is blocked, it is ensured that the safety of encryption wireless network Property.
Further, step S200 includes:Step S210 is to the corresponding wireless router of the non-encrypted wireless network Send certification request information;Wherein, the certification request information includes:MAC Address;Step S220 is in when the MAC Address During white list, then the certification of wireless router transmission is received by information, and access the non-encrypted wireless network, and perform step Rapid S300;When the MAC Address is not in white list, the certification refusal information of wireless router transmission is received, then do not had There is the qualification of connection encryption wireless network, be immediately finished wireless connection.
Specifically judging whether wireless terminal can be connected into non-encrypted wireless network, be to allow wireless router to judge currently wirelessly Whether the MAC Address of terminal is in blacklist, if it does, will not then allow wireless terminal to be connected into non-encrypted wireless network, This wireless terminal cannot be more allowed to be connected into encryption wireless network;And if the MAC Address of wireless terminal is not in blacklist, just Wireless terminal can be allowed successfully to be connected into non-encrypted wireless network, can be subsequently connected into encryption wireless network for wireless terminal and be provided base Plinth.
Further, step S500 includes:Step S510 is sent the connectivity request message by wireless router To cloud authentication server;Step S520 is when default connection request letter on the connectivity request message and cloud authentication server When ceasing consistent, then receive cloud authentication server and information is passed through by the request that wireless router feeds back;Step S530 is when reception When passing through information to the request fed back by the wireless router, the encryption wireless network is successfully accessed.
When wireless terminal is connected into encryption wireless network, typically using EAP (Extensible Authentication Protocol, EAP) authentication mode, need just complete whole by the help of cloud authentication server Individual verification process, there is provided safer flexible authentication function;And the introducing of cloud authentication server has been also convenient for for VIP is used The concrete management at family, it is ensured that allow VIP user to enjoy quality services.
The present invention also provides a kind of wireless connection system, including:Wireless terminal, wireless router;The wireless terminal bag Include:Scanning element, for the non-encrypted wireless network that scanning obtains visible SSID;Acquiring unit, is electrically connected with the scanning element Connect, the acquiring unit obtains encrypting the hiding SSID of wireless network according to the visible SSID;Transmitting element, obtains with described Unit electrical connection is taken, the transmitting element is sent out by the hiding SSID to the corresponding wireless router of the encryption wireless network Send connectivity request message;Receiving unit, the request for receiving the wireless router feedback passes through information;Access unit, with The receiving unit electrical connection, the access unit accesses the encryption wireless network;The wireless router includes:Feedback Unit, for feeding back the request by information.
After the non-encrypted wireless network that scanning obtains visible SSID, corresponding hiding can be obtained according to visible SSID SSID, so as to realize that the purpose of the corresponding encryption wireless networks of SSID is hidden in wireless terminal connection, obtains register user To the network legal power of encryption wireless network, the experience of register user is substantially increased.
Further, the acquiring unit is specifically included:Rule acquisition module, for according to the visible SSID and present count According to storehouse, transformational rule is preset accordingly;Wherein, the default transformational rule includes:Operational parameter and default transfer algorithm; SSID acquisition modules, electrically connect with the rule acquisition module, for according to the visible SSID, the default transformational rule, Obtain the hiding SSID of the encryption wireless network;The rule acquisition module is specifically included:Parameter acquiring submodule, obtains institute State the operational parameter included in visible SSID;Algorithm acquisition submodule, obtains the default transfer algorithm in the presetting database; Wherein, the presetting database only includes a kind of default transfer algorithm;The default transfer algorithm is:Replace enciphered method, Or, evolution method.
Hiding SSID is obtained according to visible SSID and default transformational rule, and operational parameter and default transfer algorithm are Necessary factor, when presetting database is only stored with a kind of default transfer algorithm, it is seen that SSID can only include operational parameter, this Unique a kind of default transfer algorithm of the sample in the operational parameter and presetting database included in visible SSID, is calculated phase The hiding SSID for answering, so as to be subsequently connected to the corresponding encryption wireless networks of hiding SSID.
Further, the acquiring unit is specifically included:Rule acquisition module, for according to the visible SSID and present count According to storehouse, transformational rule is preset accordingly;Wherein, the default transformational rule includes:Operational parameter and default transfer algorithm; SSID acquisition modules, electrically connect with the rule acquisition module, for according to the visible SSID, the default transformational rule, Obtain the hiding SSID of the encryption wireless network;The rule acquisition module is specifically included:Parameter algorithm acquisition submodule, uses The operational parameter included in the acquisition visible SSID and algorithm mark;Algorithm searches submodule, for according to the algorithm Mark finds corresponding default transfer algorithm in the presetting database;Wherein, the presetting database is included at least A kind of default transfer algorithm;Default transfer algorithm in the presetting database includes following at least one:Replace encryption Method, evolution method.
Can be stored with various default transfer algorithms simultaneously in presetting database, and specifically using which kind of default transfer algorithm come Coordinate operational parameter and visible SSID to obtain hiding SSID, be to identify to determine based on the algorithm being included in visible SSID; Be stored with various default transfer algorithms in presetting database, it is ensured that default transfer algorithm will not be cracked easily, and visible Both operational parameter had been contained in SSID, algorithm mark had been also contains, certain interference effect had also been served to cracker, and allowed and solve firmly Person quickly positions calculations parameter and algorithm cannot identify, many considerations, it is ensured that hide the safety of SSID, further protect Demonstrate,prove the corresponding encryption wireless networks of hiding SSID to be difficult to be easily found;And when encryption wireless network is connected into, can pass through EAP authentication, this authentication mode has more motility, reliability, substantially increases the experience of user.
Compared with prior art, the beneficial effects of the present invention is:
A kind of wireless connection method and system of the present invention, provides the clothes of differentiation can to domestic consumer and VIP user Business, allows VIP user to obtain more preferable any wireless network services, substantially increases the experience and satisfaction of VIP user.
Description of the drawings
Below by clearly understandable mode, preferred implementation is described with reference to the drawings, to a kind of wireless connection method and The above-mentioned characteristic of system, technical characteristic, advantage and its implementation are further described.
Fig. 1 is the flow chart of wireless connection method one embodiment of the present invention;
Fig. 2 is the flow chart of another embodiment of wireless connection method of the present invention;
Fig. 3 is the flow chart of Fig. 2 step S310 one embodiment;
Fig. 4 is the structural representation of wireless connection system one embodiment of the present invention;
Fig. 5 is the structural representation of another embodiment of wireless connection system of the present invention;
Fig. 6 is the structural representation of another embodiment of wireless connection system of the present invention.
Drawing reference numeral explanation:
1000. wireless terminals, 1100. scanning elements, 1200. acquiring units, 1210. rule acquisition modules, 1211. parameters Acquisition submodule, 1212. algorithm acquisition submodules, 1213. parameter algorithm acquisition submodules, 1214. algorithms search submodule, 1220.SSID acquisition modules, 1300. transmitting elements, 1400. receiving units, 1500. access units, 2000. wireless routers, 2100. feedback unit.
Specific embodiment
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below by control description of the drawings The specific embodiment of the present invention.It should be evident that drawings in the following description are only some embodiments of the present invention, for For those of ordinary skill in the art, on the premise of not paying creative work, can be obtaining other according to these accompanying drawings Accompanying drawing, and obtain other embodiments.
To make simplified form, part related to the present invention is only schematically show in each figure, they are not represented Its practical structures as product.In addition, so that simplified form is readily appreciated, with identical structure or function in some figures Part, only symbolically depicts one of those, or has only marked one of those.Herein, " one " is not only represented " only this ", it is also possible to represent the situation of " more than one ".
In one embodiment of the invention, as shown in figure 1, a kind of wireless connection method, including:Step S100 is scanned To the non-encrypted wireless network of visible SSID;Step S300 obtains encrypting hiding for wireless network according to the visible SSID SSID;Step S400 sends connection request letter by the hiding SSID to the corresponding wireless router of the encryption wireless network Breath;Step S500 is successfully accessed the encryption wireless network when the request for receiving wireless router feedback passes through information.
Specifically, a non-encrypted wireless network is provided in wireless router, its SSID is visible, and another adds Close wireless network, its SSID is hiding, allows wireless terminal to connect wireless router by two kinds of different modes.Purpose It is externally to embody a wireless network, but different wireless terminal user (domestic consumer and VIP user, Huo Zheli can be supported Xie Wei, nonregistered user and register user) connect wireless router using different modes.Because two class users are using different Authentication mode and safe class, wireless router can provide different types of user the service of differentiation.Such as:It is non-registered User can only access limited website and service, and register user can obtain complete internet access authority or internal services are visited Ask authority.
The mode for distinguishing nonregistered user and register user can be by judging whether there is corresponding wireless on wireless terminal Network connection application program, if any, the user for then illustrating contemporary wireless terminals is register user, can attempt obtaining hidden Hide SSID.
The visible SSID of non-encrypted wireless network and the hiding SSID of encryption wireless network have corresponding relation, therefore, root Obtain encrypting the hiding SSID of wireless network according to visible SSID.When wireless terminal wants to be connected into encryption wireless network, need to pass through Related certification, for example:EAP authentication (EAP protocol), EAP is an authentication framework, is not a special authentication mechanism.EAP Agreement is the core of IEEE802.1x authentication mechanisms, and it will realize that details transfers to attached EAP Method agreements to complete, and be based on The certification of EAP protocol is used for corporate authentication, relative to PSK modes, can provide safer flexible authentication function.Only exist When the request for receiving wireless router feedback passes through information, wireless terminal could successfully be connected into encryption wireless network, carry out The operation of net.
Preferably, step S300 includes:Step S310 obtains corresponding according to the visible SSID and presetting database Default transformational rule;Wherein, the default transformational rule includes:Operational parameter and the default transfer algorithm;Step S320 According to the visible SSID, the default transformational rule, the hiding SSID of the encryption wireless network is obtained.
Specifically, hiding SSID can be obtained according to visible SSID and default transformational rule, be this arrangement ensure that hiding Correspondence between SSID and visible SSID, facilitates wireless terminal after scanning to non-encrypted wireless network, can quickly calculate The hiding SSID of wireless network is encrypted accordingly, is easy to register user to be connected into encryption wireless network, obtained high-quality Service.
Preferably, step S310 includes:Step S311 obtains the operational parameter included in the visible SSID;Step S312 obtains the default transfer algorithm in the presetting database;Wherein, the presetting database only includes a kind of described default Transfer algorithm;The default transfer algorithm is:Enciphered method is replaced, or, evolution method.
Specifically, it is seen that operational parameter can be included in SSID, and default transfer algorithm can be stored in presetting database In, it should be noted that in order to ensure to obtain a corresponding hiding SSID according to a visible SSID, default transfer algorithm must Must be a kind of, i.e., a kind of default transfer algorithm is only saved in presetting database, then coordinate operational parameter and visible SSID, obtain Corresponding hiding SSID is arrived.Default transfer algorithm can be selected voluntarily, for example:1) enciphered method is replaced, is referred to, if visible SSID is ABC-1, and 1 is operational parameter, refers to that ABC respectively adds one to be replaced accordingly according to the definition for replacing enciphered method, then It is BCD to obtain hiding SSID;By that analogy, if visible SSID is ABC-2, it is CDE to hide SSID.2) evolution method, if It can be seen that SSID is ABC-1,1 is operational parameter, and the definition of evolution method can be displaced to last position for first, and 1 represents this The move mode of sample is BCA once, that is, to obtain hiding SSID;If it can be seen that SSID is ABC-2,2 represent movement twice, that is, obtain Hiding SSID is CAB.Using operational parameter and default transfer algorithm obtain hide SSID, it is ensured that hide SSID be difficult crack Property, it is ensured that the safety of encryption wireless network.Default transfer algorithm has many kinds, as long as guaranteeing according to operational parameter and can See that SSID obtains corresponding hiding SSID, here, do not specify specifically with which kind of default transfer algorithm.
Preferably, step S310 includes:Step S313 obtains the operational parameter and calculation included in the visible SSID Method is identified;Step S314 finds corresponding default transfer algorithm according to algorithm mark in the presetting database;Its In, the presetting database includes at least one default transfer algorithm;Default conversion in the presetting database is calculated Method includes following at least one:Replace enciphered method, evolution method.
Specifically, when identifying comprising algorithm in visible SSID, various default conversion calculations that are stored with presetting database are illustrated Method, needs to find corresponding default transfer algorithm using this algorithm mark, this in visible SSID so as to obtain hiding SSID Design comprising algorithm mark and operational parameter simultaneously, further ensure hiding SSID is difficult cracking.For example:Present count Enciphered method and evolution method are replaced according to can be stored with storehouse simultaneously, when visible SSID is ABC-12,1 represents algorithm mark, Corresponding is to replace enciphered method, and 2 is operational parameter, and therefore, it can obtain hiding SSID is CDE;When visible SSID is During ABC-22, first 2 represents algorithm mark, and corresponding default transfer algorithm is evolution method, and second 2 is computing ginseng Number, therefore, it can obtain hiding SSID is CAB.
Preferably, also include between step S100 and step S300:Step S200 judges whether to connect Enter the non-encrypted wireless network, if so, then execution step S300, if it is not, then there is no the qualification of connection encryption wireless network, It is immediately finished wireless connection.
Preferably, step S200 includes:Step S210 is to the corresponding wireless router of the non-encrypted wireless network Send certification request information;Wherein, the certification request information includes:MAC Address;Step S220 is in when the MAC Address During white list, then the certification of wireless router transmission is received by information, and be connected into the non-encrypted wireless network, and perform step Rapid S300;When the MAC Address is not in white list, the certification refusal information of wireless router transmission is received, then do not had There is the qualification of connection encryption wireless network, be immediately finished wireless connection.
Specifically, after the non-encrypted wireless network of scanning to visible SSID, this non-encrypted wireless network can be attached Network, can be based on the authentication mode of WEB, for example in verification process:1) wireless terminal browser is opened, is input into any network address; 2) webpage automatic jumps to certification page, and the input mode such as usemame/password or cell-phone number/identifying code is verified;3) verify After success, the Internet can be accessed.
Can also be sent to the MAC Address of wireless router to judge whether wireless terminal is according to wireless terminal Wireless terminal in blacklist, if it is not, then allow wireless terminal to be successfully connected into non-encrypted wireless network being surfed the Net;If If being, then wireless terminal is not eligible for being connected into all wireless networks of wireless router, including non-encrypted wireless network and plus Close wireless network.After wireless terminal can be connected into non-encrypted wireless network, in other words, when wireless terminal has encryption nothing is connected into During the qualification of gauze network, follow-up acquisition is hidden SSID and sends connectivity request message etc., and wireless network can be allowed to connect should Completed with Automatic Program, manually performed without the need for user, it is simple, convenient.
Preferably, step S500 includes:Step S510 is sent the connectivity request message by wireless router To cloud authentication server;Step S520 is when default connection request letter on the connectivity request message and cloud authentication server When ceasing consistent, then receive cloud authentication server and information is passed through by the request that wireless router feeds back;Step S530 is when reception When passing through information to the request fed back by the wireless router, it is successfully connected into the encryption wireless network.
Specifically, when hiding SSID has been obtained, wireless terminal just can be to the corresponding encryption wireless networks of this hiding SSID The corresponding wireless router of network sends connectivity request message, and the connectivity request message for receiving is sent to high in the clouds by wireless router Certificate server, when receive connectivity request message with default connectivity request message is consistent in cloud authentication server when, cloud End certificate server to wireless router sends request by information, and wireless router will be asked by feedback of the information to undoubtedly again Terminal, allows wireless terminal to be successfully connected into encryption wireless network, facilitates register user to carry out net operation.
Also include in step S520:When default connection request letter on the connectivity request message and cloud authentication server When ceasing inconsistent, then receive cloud authentication server and information is refused by the request that wireless router feeds back, it is impossible to be connected to institute State encryption wireless network.This explanation wireless terminal cannot be connected into encryption wireless network not over certification, when this, Wireless terminal can only be connected into non-encrypted wireless network, obtain the network service of non-encrypted wireless network.
When wireless terminal is connected to encryption wireless network, EAP authentication mode can be based on, this authentication mode needs high in the clouds Server is supported.Authentication mode based on EAP protocol for each user typically support to use independent usemame/password or Certificate is authenticated, and so can carry out finer management to each register user.
In another embodiment of the present invention, as shown in Figure 2 and Figure 3, a kind of wireless connection method, including:Step S100 Scanning obtains the non-encrypted wireless network of visible SSID;Step S200 judges whether to have access to the non-encrypted wireless network, If so, then execution step S300, if it is not, then not having the qualification of connection encryption wireless network, is immediately finished wireless connection;It is described Step S200 includes:Step S210 to the corresponding wireless router of the non-encrypted wireless network sends certification request information;Its In, the certification request information includes:MAC Address;Step S220 receives wireless when the MAC Address is in white list, then The certification that router sends accesses the non-encrypted wireless network, and execution step S300 by information;When MAC ground When location is not in white list, the certification refusal information of wireless router transmission is received, then there is no connection encryption wireless network Qualification, be immediately finished wireless connection;Step S300 obtains encrypting the hiding SSID of wireless network according to the visible SSID; Step S300 includes:Step S310 is preset accordingly transformational rule according to the visible SSID and presetting database; Wherein, the default transformational rule includes:Operational parameter and the default transfer algorithm;Step S310 includes:Step S311 obtains the operational parameter included in the visible SSID;The default conversion that step S312 is obtained in the presetting database is calculated Method;Wherein, the presetting database only includes a kind of default transfer algorithm;The default transfer algorithm is:Replace encryption Method, or, evolution method;Or, step S313 obtains the operational parameter and algorithm mark included in the visible SSID;Step S314 finds corresponding default transfer algorithm according to algorithm mark in the presetting database;Wherein, it is described default Data base includes at least one default transfer algorithm;Default transfer algorithm in the presetting database include it is following extremely Few one kind:Replace enciphered method, evolution method;Step S320 obtains institute according to the visible SSID, the default transformational rule State the hiding SSID of encryption wireless network;Step S400 is corresponding wireless to the encryption wireless network by the hiding SSID Router sends connectivity request message;Step S500 successfully connects when the request for receiving wireless router feedback passes through information Enter the encryption wireless network;Step S500 includes:Step S510 passes through wireless router, by the connectivity request message It is sent to cloud authentication server;Step S520 please when default connection on the connectivity request message and cloud authentication server When asking information consistent, then receive cloud authentication server and information is passed through by the request that wireless router feeds back;Step S530 is worked as When receiving the request fed back by the wireless router by information, the encryption wireless network is successfully accessed.
Specifically, the present invention can allow different user to be connected into different wireless networks, so as to enjoy different network weights Limit, makes businessman that the service of differentiation is provided to different users, substantially increases the satisfaction of register user.
In another embodiment of the present invention, as shown in figure 4, a kind of wireless connection system, including:Wireless terminal 1000, wireless router 2000;The wireless terminal 1000 includes:Scanning element 1100, obtains visible SSID's for scanning Non-encrypted wireless network;Acquiring unit 1200, electrically connects with the scanning element 1100, and the acquiring unit 1200 is according to described It can be seen that SSID, obtains encrypting the hiding SSID of wireless network;Transmitting element 1300, electrically connects with the acquiring unit 1200, institute State transmitting element 1300 and connection request is sent to the corresponding wireless router of the encryption wireless network by the hiding SSID Information;Receiving unit 1400, the request for receiving the wireless router feedback passes through information;Access unit 1500, with institute State receiving unit 1400 to electrically connect, the access unit accesses the encryption wireless network;The wireless router 2000 includes: Feedback unit 2100, for feeding back the request by information.
Specifically, after the non-encrypted wireless network that scanning obtains visible SSID, correspondence can be obtained according to visible SSID Hiding SSID, so as to realize wireless terminal connection on hide SSID it is corresponding encryption wireless network purpose, make register user Can obtain encrypting the network legal power of wireless network, substantially increase the experience of register user.
In another embodiment of the present invention, as shown in figure 5, a kind of wireless connection system, wireless terminal 1000, wirelessly Router 2000;The wireless terminal 1000 includes:Scanning element 1100, for scanning the non-encrypted wireless of visible SSID is obtained Network;Acquiring unit 1200, electrically connects with the scanning element 1100, the acquiring unit 1200 according to the visible SSID, Obtain encrypting the hiding SSID of wireless network;The acquiring unit 1200 is specifically included:Rule acquisition module 1210, for basis The visible SSID and presetting database, are preset accordingly transformational rule;Wherein, the default transformational rule includes:Fortune Calculate parameter and default transfer algorithm;SSID acquisition modules 1220, electrically connect with the rule acquisition module 1210, for according to institute Visible SSID, the default transformational rule are stated, the hiding SSID of the encryption wireless network is obtained;The rule acquisition module 1210 specifically include:Parameter acquiring submodule 1211, obtains the operational parameter included in the visible SSID;Algorithm obtains submodule Block 1212, obtains the default transfer algorithm in the presetting database;Wherein, the presetting database only includes a kind of described pre- If transfer algorithm;The default transfer algorithm is:Enciphered method is replaced, or, evolution method;Transmitting element 1300, obtains with described Take unit 1200 to electrically connect, the transmitting element is by the hiding SSID to the corresponding wireless routing of the encryption wireless network Device sends connectivity request message;Receiving unit 1400, the request for receiving the wireless router feedback passes through information;Access Unit 1500, electrically connects with the receiving unit, and the access unit accesses the encryption wireless network;The wireless router 2000 include:Feedback unit 2100, for feeding back the request by information.
Specifically, hiding SSID is obtained according to visible SSID and default transformational rule, and operational parameter and default turn Scaling method is necessary factor, when presetting database is only stored with a kind of default transfer algorithm, it is seen that SSID can only comprising fortune Calculation parameter, the unique a kind of default transfer algorithm so in the operational parameter and presetting database included in visible SSID, Hiding SSID accordingly is calculated, so as to be subsequently connected to the corresponding encryption wireless networks of hiding SSID.
In another embodiment of the present invention, as shown in fig. 6, a kind of wireless connection system, including:Wireless terminal 1000, wireless router 2000;The wireless terminal 1000 includes:Scanning element 1100, obtains visible SSID's for scanning Non-encrypted wireless network;Acquiring unit 1200, electrically connects with the scanning element, and the acquiring unit is according to described visible SSID, obtains encrypting the hiding SSID of wireless network;The acquiring unit 1200 is specifically included:Rule acquisition module 1210, uses According to the visible SSID and presetting database, transformational rule is preset accordingly;Wherein, the default transformational rule bag Include:Operational parameter and default transfer algorithm;SSID acquisition modules 1220, electrically connect, for basis with the rule acquisition module The visible SSID, the default transformational rule, obtain the hiding SSID of the encryption wireless network;The rule acquisition module 1210 specifically include:Parameter algorithm acquisition submodule 1213, for obtaining the visible SSID in the operational parameter that includes and calculation Method is identified;Algorithm searches submodule 1214, corresponding for being found in the presetting database according to algorithm mark Default transfer algorithm;Wherein, the presetting database includes at least one default transfer algorithm;The presetting database In default transfer algorithm include following at least one:Replace enciphered method, evolution method;Transmitting element 1300, obtains with described Unit electrical connection is taken, the transmitting element is sent out by the hiding SSID to the corresponding wireless router of the encryption wireless network Send connectivity request message;Receiving unit 1400, the request for receiving the wireless router feedback passes through information;Access unit 1500, electrically connect with the receiving unit, the access unit accesses the encryption wireless network;The wireless router 2000 Including:Feedback unit 2100, for feeding back the request by information.
Specifically, can be stored with various default transfer algorithms simultaneously in presetting database, and specifically using which kind of default turn Scaling method come coordinate operational parameter and visible SSID obtain hide SSID, be based on be included in visible SSID algorithm mark come It is determined that;Be stored with various default transfer algorithms in presetting database, it is ensured that default transfer algorithm will not be cracked easily, and It can be seen that both having contained operational parameter in SSID, algorithm mark is also contains, certain interference effect is also served to cracker, allowed Hard solution person quickly positions calculations parameter and algorithm cannot identify, many considerations, it is ensured that hide the safety of SSID, enter Step ensure that the corresponding encryption wireless networks of hiding SSID are difficult to be easily found;And when encryption wireless network is connected into, can be with By EAP authentication, this authentication mode has more motility, reliability, substantially increases the experience of user.
It should be noted that above-described embodiment can independent assortment as needed.The above is only the preferred of the present invention Embodiment, it is noted that for those skilled in the art, in the premise without departing from the principle of the invention Under, some improvements and modifications can also be made, these improvements and modifications also should be regarded as protection scope of the present invention.

Claims (10)

1. a kind of wireless connection method, it is characterised in that include:
The scanning of step S100 obtains the non-encrypted wireless network of visible SSID;
Step S300 obtains encrypting the hiding SSID of wireless network according to the visible SSID;
Step S400 sends connection request letter by the hiding SSID to the corresponding wireless router of the encryption wireless network Breath;
Step S500 is successfully accessed the encryption wireless network when the request for receiving wireless router feedback passes through information.
2. wireless connection method as claimed in claim 1, it is characterised in that step S300 includes:
Step S310 is preset accordingly transformational rule according to the visible SSID and presetting database;
Wherein, the default transformational rule includes:Operational parameter and default transfer algorithm;
Step S320 obtains the hiding SSID of the encryption wireless network according to the visible SSID, the default transformational rule.
3. wireless connection method as claimed in claim 2, it is characterised in that step S310 includes:
Step S311 obtains the operational parameter included in the visible SSID;
Step S312 obtains the described default transfer algorithm in the presetting database;
Wherein, the presetting database only includes a kind of default transfer algorithm;
The default transfer algorithm is:
Enciphered method is replaced, or, evolution method.
4. wireless connection method as claimed in claim 2, it is characterised in that step S310 includes:
Step S313 obtains the operational parameter and algorithm mark included in the visible SSID;
Step S314 finds corresponding default transfer algorithm according to algorithm mark in the presetting database;
Wherein, the presetting database includes at least one default transfer algorithm;
Default transfer algorithm in the presetting database includes following at least one:
Replace enciphered method, evolution method.
5. wireless connection method as claimed in claim 1, its feature DIYU, between step S100 and step S300 Also include:
Step S200 judges whether to have access to the non-encrypted wireless network, if so, then execution step S300, if it is not, then not Qualification with connection encryption wireless network, is immediately finished wireless connection.
6. wireless connection method as claimed in claim 5, it is characterised in that step S200 includes:
Step S210 to the corresponding wireless router of the non-encrypted wireless network sends certification request information;
Wherein, the certification request information includes:MAC Address;
Step S220 receives the certification of wireless router transmission by information when the MAC Address is in white list, then, and connects Enter the non-encrypted wireless network, and execution step S300;When the MAC Address is not in white list, receive without circuit The certification refusal information sent by device, then do not have the qualification of connection encryption wireless network, is immediately finished wireless connection.
7. the wireless connection method as described in claim 1-6 is arbitrary, it is characterised in that step S500 includes:
The connectivity request message is sent to cloud authentication server by step S510 by wireless router;
Step S520 then connects when default connectivity request message is consistent on the connectivity request message with cloud authentication server Receive cloud authentication server and information is passed through by the request that wireless router feeds back;
Step S530 is successfully accessed described adding when the request fed back by the wireless router is received by information Close wireless network.
8. a kind of wireless connection system of the wireless connection method using as described in claim 1-7 is arbitrary, it is characterised in that wrap Include:
Wireless terminal, wireless router;
The wireless terminal includes:
Scanning element, for the non-encrypted wireless network that scanning obtains visible SSID;
Acquiring unit, electrically connects with the scanning element, and the acquiring unit obtains encrypting wireless network according to the visible SSID The hiding SSID of network;
Transmitting element, electrically connects with the acquiring unit, and the transmitting element is wireless to the encryption by the hiding SSID The corresponding wireless router of network sends connectivity request message;
Receiving unit, the request for receiving the wireless router feedback passes through information;
Access unit, electrically connects with the receiving unit, and the access unit accesses the encryption wireless network;
The wireless router includes:
Feedback unit, for feeding back the request by information.
9. wireless connection system as claimed in claim 8, it is characterised in that the acquiring unit is specifically included:
Rule acquisition module, for according to the visible SSID and presetting database, transformational rule being preset accordingly;
Wherein, the default transformational rule includes:Operational parameter and default transfer algorithm;
SSID acquisition modules, electrically connect with the rule acquisition module, for according to the visible SSID, the default conversion rule Then, the hiding SSID of the encryption wireless network is obtained;
The rule acquisition module is specifically included:
Parameter acquiring submodule, obtains the operational parameter included in the visible SSID;
Algorithm acquisition submodule, obtains the default transfer algorithm in the presetting database;
Wherein, the presetting database only includes a kind of default transfer algorithm;
The default transfer algorithm is:
Enciphered method is replaced, or, evolution method.
10. wireless connection method as claimed in claim 8, it is characterised in that the acquiring unit is specifically included:
Rule acquisition module, for according to the visible SSID and presetting database, transformational rule being preset accordingly;
Wherein, the default transformational rule includes:Operational parameter and default transfer algorithm;
SSID acquisition modules, electrically connect with the rule acquisition module, for according to the visible SSID, the default conversion rule Then, the hiding SSID of the encryption wireless network is obtained;
The rule acquisition module is specifically included:
Parameter algorithm acquisition submodule, for obtaining the visible SSID in the operational parameter that includes and algorithm mark;
Algorithm searches submodule, for corresponding default conversion to be found in the presetting database according to algorithm mark Algorithm;
Wherein, the presetting database includes at least one default transfer algorithm;
Default transfer algorithm in the presetting database includes following at least one:
Replace enciphered method, evolution method.
CN201610909004.0A 2016-10-18 2016-10-18 A kind of wireless connection method and system Active CN106572465B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610909004.0A CN106572465B (en) 2016-10-18 2016-10-18 A kind of wireless connection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610909004.0A CN106572465B (en) 2016-10-18 2016-10-18 A kind of wireless connection method and system

Publications (2)

Publication Number Publication Date
CN106572465A true CN106572465A (en) 2017-04-19
CN106572465B CN106572465B (en) 2019-07-30

Family

ID=58533801

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610909004.0A Active CN106572465B (en) 2016-10-18 2016-10-18 A kind of wireless connection method and system

Country Status (1)

Country Link
CN (1) CN106572465B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107182053A (en) * 2017-06-08 2017-09-19 上海掌门科技有限公司 A kind of method and apparatus for being used to connect hiding WAP
CN108260107A (en) * 2018-01-10 2018-07-06 广州二元科技有限公司 A kind of bicycle built-in device unlocking method based on Wi-Fi
CN110431868A (en) * 2017-08-23 2019-11-08 华为技术有限公司 A kind of connection method and terminal of Wi-Fi Hotspot
CN111368272A (en) * 2020-03-16 2020-07-03 珠海格力电器股份有限公司 Space monitoring management system, method, storage medium and computer equipment
GB2605149A (en) * 2021-03-23 2022-09-28 British Telecomm Method of operating a network

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104113934A (en) * 2014-07-25 2014-10-22 北京奇虎科技有限公司 Router accessing method for communication equipment and accessing system
CN104488303A (en) * 2014-04-16 2015-04-01 华为终端有限公司 Device and method for accessing to wireless network
CN104717296A (en) * 2015-03-25 2015-06-17 阳海龙 Social contact interactive method, device, terminal and system
CN104936181A (en) * 2015-06-25 2015-09-23 杭州华三通信技术有限公司 Access authentication method and device for connecting specified AP (Access Point)
CN105554746A (en) * 2016-03-08 2016-05-04 叶茂森 WIFI local area network communication system based on encryption SSID (Service Set Identifier)

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104488303A (en) * 2014-04-16 2015-04-01 华为终端有限公司 Device and method for accessing to wireless network
CN104113934A (en) * 2014-07-25 2014-10-22 北京奇虎科技有限公司 Router accessing method for communication equipment and accessing system
CN104717296A (en) * 2015-03-25 2015-06-17 阳海龙 Social contact interactive method, device, terminal and system
CN104936181A (en) * 2015-06-25 2015-09-23 杭州华三通信技术有限公司 Access authentication method and device for connecting specified AP (Access Point)
CN105554746A (en) * 2016-03-08 2016-05-04 叶茂森 WIFI local area network communication system based on encryption SSID (Service Set Identifier)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11057821B2 (en) 2017-06-08 2021-07-06 Shanghai Zhangmen Science And Technology Co., Ltd. Method and device for connecting to hidden wireless access point
CN107182053A (en) * 2017-06-08 2017-09-19 上海掌门科技有限公司 A kind of method and apparatus for being used to connect hiding WAP
WO2018223908A1 (en) * 2017-06-08 2018-12-13 上海掌门科技有限公司 Method and device for connecting to hidden wireless access point
CN107182053B (en) * 2017-06-08 2019-06-07 上海掌门科技有限公司 It is a kind of for connecting the method and apparatus of hiding wireless access point
CN110113747A (en) * 2017-06-08 2019-08-09 上海掌门科技有限公司 It is a kind of for connecting the method and apparatus of hiding wireless access point
US11277744B2 (en) 2017-08-23 2022-03-15 Huawei Technologies Co., Ltd. Wi-Fi hotspot connection method and terminal
CN110431868A (en) * 2017-08-23 2019-11-08 华为技术有限公司 A kind of connection method and terminal of Wi-Fi Hotspot
CN108260107A (en) * 2018-01-10 2018-07-06 广州二元科技有限公司 A kind of bicycle built-in device unlocking method based on Wi-Fi
CN111368272A (en) * 2020-03-16 2020-07-03 珠海格力电器股份有限公司 Space monitoring management system, method, storage medium and computer equipment
CN111368272B (en) * 2020-03-16 2021-07-20 珠海格力电器股份有限公司 Space monitoring management system, method, storage medium and computer equipment
GB2605149A (en) * 2021-03-23 2022-09-28 British Telecomm Method of operating a network
WO2022199963A1 (en) * 2021-03-23 2022-09-29 British Telecommunications Public Limited Company Method of operating a network
GB2605149B (en) * 2021-03-23 2023-09-06 British Telecomm Method of operating a network

Also Published As

Publication number Publication date
CN106572465B (en) 2019-07-30

Similar Documents

Publication Publication Date Title
CN104767715B (en) Access control method and equipment
CN104836787B (en) System and method for Authentication Client website
CN103688565B (en) The safe online registration and supply of the WI FI focuses of use device management agreement
CN106572465A (en) Wireless connection method and system thereof
CN104168561B (en) Hot spot configuration method, cut-in method and equipment in a kind of WLAN
US8533798B2 (en) Method and system for controlling access to networks
CN1685694B (en) Session key management for public wireless lan supporitng multiple virtual operators
JP4160049B2 (en) Method and system for providing access to services of a second network through a first network
US7418591B2 (en) Network configuration method and communication system and apparatus
CN108028829A (en) For obtaining the method being initially accessed and relevant wireless device and network node to network
JP2018170010A (en) Terminal authentication method and device to be used for mobile communication system
CN107567017B (en) Wireless connection system, device and method
CN104994504A (en) Secure and automatic connection to wireless network
JP2006517359A (en) Method and apparatus for providing network service information to a mobile station over a wireless local area network
WO2006097041A1 (en) A general authentication former and a method for implementing the authentication
CN106330445B (en) Vehicle authentication method and device
JP6997886B2 (en) Non-3GPP device access to core network
US10356651B2 (en) Controlled connection of a wireless device to a network
CN104247485B (en) Network application function authorization in Generic Bootstrapping Architecture
CN104869121B (en) A kind of authentication method and device based on 802.1x
JP2023530896A (en) Systems and methods for operating user devices with personalized identity module profiles
CN105451298A (en) Network-sharing method and system, network access method and system, and electronic device
CN109391937A (en) Acquisition methods, equipment and the system of public key
CN103685201A (en) Method and system for WLAN user fixed network access
CN105101274B (en) The configuration method and device of message pass-through mode

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 201203 Pudong New Area, Shanghai, China (Shanghai) free trade pilot area 899 9, 1-4 1-4 story 01 rooms.

Applicant after: Shanghai PeopleNet Security Technology Co., Ltd.

Address before: 201821 211 rooms, No. 1411, Yecheng Road, Jiading District, Shanghai

Applicant before: Shanghai PeopleNet Security Technology Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant