CN106572465A - Wireless connection method and system thereof - Google Patents
Wireless connection method and system thereof Download PDFInfo
- Publication number
- CN106572465A CN106572465A CN201610909004.0A CN201610909004A CN106572465A CN 106572465 A CN106572465 A CN 106572465A CN 201610909004 A CN201610909004 A CN 201610909004A CN 106572465 A CN106572465 A CN 106572465A
- Authority
- CN
- China
- Prior art keywords
- ssid
- wireless
- wireless network
- default
- algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/11—Allocation or use of connection identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
Abstract
The invention discloses a wireless connection method and a system thereof. The method comprises the following steps of stepS100, scanning and acquiring an unencrypted wireless network of a visible SSID; stepS300, according to the visible SSID, acquiring a hidden SSID of an encrypted wireless network; stepS400, through the hidden SSID, sending connection request information to a wireless router corresponding to the encrypted wireless network; and stepS500, when request passing information fed back by the wireless router is received, successfully accessing the encrypted wireless network. By using the wireless connection method and the system thereof, different services can be provided for a common user and a VIP user so that the VIP user acquires a better wireless network service, and a usage experience and satisfaction of the VIP user are greatly increased.
Description
Technical field
The present invention relates to wireless communication field, more particularly to a kind of wireless connection method and system.
Background technology
With the development of science and technology, the equipment such as mobile phone, panel computer, notebook computer has become indispensable during we live
Few article, in order to there is preferably experience, they are owned by wireless connecting function, and they can pass through Wi-Fi
(Wireless-Fidelity, Wireless Fidelity) accesses wireless network, such that it is able to carry out internet communication.
Many non-encrypted wireless networks are had in present public arena, primarily to improve service quality, therefore, this
A little non-encrypted wireless networks are typically provided by each businessman, market.For convenience the wireless terminal of client is connected into wireless network, this
The SSID (Service Set Identifier, service set) of a little non-encrypted wireless networks is visible, and this is just meaned
What is businessman and provide for all clients is all identical service, it is impossible to provide differentiated service according to different customers;And this
Plant non-encrypted wireless network and typically all adopt WEB authentication modes, need the manual connection of client oneself, step is cumbersome.
The content of the invention
It is an object of the invention to provide a kind of wireless connection method and system, realize providing difference to different types of user
The service of change, so as to improve the purpose of Consumer's Experience.
The technical scheme that the present invention is provided is as follows:
A kind of wireless connection method, including:The scanning of step S100 obtains the non-encrypted wireless network of visible SSID;Step
S300 obtains encrypting the hiding SSID of wireless network according to the visible SSID;Step S400 is by the hiding SSID to institute
State the corresponding wireless router of encryption wireless network and send connectivity request message;Step S500 ought receive wireless router feedback
Request pass through information when, be successfully accessed the encryption wireless network.
User gradation is divided into into domestic consumer and VIP user's (it is also understood that nonregistered user and register user), is
Domestic consumer's any wireless network services different with VIP user's offer, to reach the purpose for lifting VIP user experiences.In tool
During body, wireless router provides a non-encrypted wireless network and encryption wireless network simultaneously, non-encrypted wireless network
SSID is visible, facilitate all users connection use (including:Domestic consumer and VIP user), and encrypt wireless network
SSID is hiding, it is meant that not all people can access this encryption wireless network, it is ensured that the use of VIP user
Authority.The hiding SSID of the visible SSID of non-encrypted wireless network and encryption wireless network has corresponding relation, can be according to can
See SSID, obtain hiding SSID, be easy to follow-up VIP user to connect by wireless terminal and encrypt wireless network, obtain excellentization
Service.
Further, step S300 includes:Step S310 obtains corresponding according to the visible SSID and presetting database
Default transformational rule;Wherein, the default transformational rule includes:Operational parameter and default transfer algorithm;Step S320 according to
The visible SSID, the default transformational rule, obtain the hiding SSID of the encryption wireless network.
It can be seen that SSID and hiding SSID have corresponding relation, it can be understood as, hiding SSID is to after visible SSID encryptions
Form, can obtain hiding SSID by default transfer algorithm and operational parameter, allow VIP user to be connected into encryption wireless network.
This default transformational rule ensures that hiding SSID has certain encryption, reduces all users and cracks and obtains hiding SSID's
May.
Further, step S310 includes:Step S311 obtains the operational parameter included in the visible SSID;Step
S312 obtains the described default transfer algorithm in the presetting database;Wherein, the presetting database only includes a kind of described
Default transfer algorithm;The default transfer algorithm is:Enciphered method is replaced, or, evolution method.
Operational parameter may be embodied in visible SSID, and default transfer algorithm can be stored in advance in presetting database
In, because can only be stored with a kind of default transfer algorithm, and the operational parameter being included in visible SSID also only exists a kind of feelings
Condition, therefore, only can obtain a hiding SSID, it is ensured that be correctly connected into the feasibility of encryption wireless network.
Further, step S310 includes:Step S313 obtains the operational parameter and calculation included in the visible SSID
Method is identified;Step S314 finds corresponding default transfer algorithm according to algorithm mark in the presetting database;Its
In, the presetting database includes at least one default transfer algorithm;Default conversion in the presetting database is calculated
Method includes following at least one:Replace enciphered method, evolution method.
When be stored with simultaneously in presetting database various default transfer algorithms when, it is seen that not only can join comprising computing in SSID
Number, also can identify comprising algorithm, and corresponding default transfer algorithm is found in presetting database using algorithm mark, obtain hidden
Hide SSID.The storage of various default transfer algorithms further ensures hiding SSID and is difficult to be cracked, so as to ensure that offer difference
The possibility of alienation any wireless network services.
Further, also include between step S100 and step S300:Step S200 judges whether to have access to
The non-encrypted wireless network, if so, then execution step S300, if it is not, then not having the qualification of connection encryption wireless network, stands
Terminate wireless connection.
Before carrying out being calculated hiding SSID, the identity of wireless terminal is also determined whether, if wireless terminal connects
Non-encrypted wireless network all cannot be connected, then it just less qualified can even encrypt wireless network, the setting resistance of this step
The possibility that some wireless terminals in blacklist are connected into encryption wireless network is blocked, it is ensured that the safety of encryption wireless network
Property.
Further, step S200 includes:Step S210 is to the corresponding wireless router of the non-encrypted wireless network
Send certification request information;Wherein, the certification request information includes:MAC Address;Step S220 is in when the MAC Address
During white list, then the certification of wireless router transmission is received by information, and access the non-encrypted wireless network, and perform step
Rapid S300;When the MAC Address is not in white list, the certification refusal information of wireless router transmission is received, then do not had
There is the qualification of connection encryption wireless network, be immediately finished wireless connection.
Specifically judging whether wireless terminal can be connected into non-encrypted wireless network, be to allow wireless router to judge currently wirelessly
Whether the MAC Address of terminal is in blacklist, if it does, will not then allow wireless terminal to be connected into non-encrypted wireless network,
This wireless terminal cannot be more allowed to be connected into encryption wireless network;And if the MAC Address of wireless terminal is not in blacklist, just
Wireless terminal can be allowed successfully to be connected into non-encrypted wireless network, can be subsequently connected into encryption wireless network for wireless terminal and be provided base
Plinth.
Further, step S500 includes:Step S510 is sent the connectivity request message by wireless router
To cloud authentication server;Step S520 is when default connection request letter on the connectivity request message and cloud authentication server
When ceasing consistent, then receive cloud authentication server and information is passed through by the request that wireless router feeds back;Step S530 is when reception
When passing through information to the request fed back by the wireless router, the encryption wireless network is successfully accessed.
When wireless terminal is connected into encryption wireless network, typically using EAP (Extensible Authentication
Protocol, EAP) authentication mode, need just complete whole by the help of cloud authentication server
Individual verification process, there is provided safer flexible authentication function;And the introducing of cloud authentication server has been also convenient for for VIP is used
The concrete management at family, it is ensured that allow VIP user to enjoy quality services.
The present invention also provides a kind of wireless connection system, including:Wireless terminal, wireless router;The wireless terminal bag
Include:Scanning element, for the non-encrypted wireless network that scanning obtains visible SSID;Acquiring unit, is electrically connected with the scanning element
Connect, the acquiring unit obtains encrypting the hiding SSID of wireless network according to the visible SSID;Transmitting element, obtains with described
Unit electrical connection is taken, the transmitting element is sent out by the hiding SSID to the corresponding wireless router of the encryption wireless network
Send connectivity request message;Receiving unit, the request for receiving the wireless router feedback passes through information;Access unit, with
The receiving unit electrical connection, the access unit accesses the encryption wireless network;The wireless router includes:Feedback
Unit, for feeding back the request by information.
After the non-encrypted wireless network that scanning obtains visible SSID, corresponding hiding can be obtained according to visible SSID
SSID, so as to realize that the purpose of the corresponding encryption wireless networks of SSID is hidden in wireless terminal connection, obtains register user
To the network legal power of encryption wireless network, the experience of register user is substantially increased.
Further, the acquiring unit is specifically included:Rule acquisition module, for according to the visible SSID and present count
According to storehouse, transformational rule is preset accordingly;Wherein, the default transformational rule includes:Operational parameter and default transfer algorithm;
SSID acquisition modules, electrically connect with the rule acquisition module, for according to the visible SSID, the default transformational rule,
Obtain the hiding SSID of the encryption wireless network;The rule acquisition module is specifically included:Parameter acquiring submodule, obtains institute
State the operational parameter included in visible SSID;Algorithm acquisition submodule, obtains the default transfer algorithm in the presetting database;
Wherein, the presetting database only includes a kind of default transfer algorithm;The default transfer algorithm is:Replace enciphered method,
Or, evolution method.
Hiding SSID is obtained according to visible SSID and default transformational rule, and operational parameter and default transfer algorithm are
Necessary factor, when presetting database is only stored with a kind of default transfer algorithm, it is seen that SSID can only include operational parameter, this
Unique a kind of default transfer algorithm of the sample in the operational parameter and presetting database included in visible SSID, is calculated phase
The hiding SSID for answering, so as to be subsequently connected to the corresponding encryption wireless networks of hiding SSID.
Further, the acquiring unit is specifically included:Rule acquisition module, for according to the visible SSID and present count
According to storehouse, transformational rule is preset accordingly;Wherein, the default transformational rule includes:Operational parameter and default transfer algorithm;
SSID acquisition modules, electrically connect with the rule acquisition module, for according to the visible SSID, the default transformational rule,
Obtain the hiding SSID of the encryption wireless network;The rule acquisition module is specifically included:Parameter algorithm acquisition submodule, uses
The operational parameter included in the acquisition visible SSID and algorithm mark;Algorithm searches submodule, for according to the algorithm
Mark finds corresponding default transfer algorithm in the presetting database;Wherein, the presetting database is included at least
A kind of default transfer algorithm;Default transfer algorithm in the presetting database includes following at least one:Replace encryption
Method, evolution method.
Can be stored with various default transfer algorithms simultaneously in presetting database, and specifically using which kind of default transfer algorithm come
Coordinate operational parameter and visible SSID to obtain hiding SSID, be to identify to determine based on the algorithm being included in visible SSID;
Be stored with various default transfer algorithms in presetting database, it is ensured that default transfer algorithm will not be cracked easily, and visible
Both operational parameter had been contained in SSID, algorithm mark had been also contains, certain interference effect had also been served to cracker, and allowed and solve firmly
Person quickly positions calculations parameter and algorithm cannot identify, many considerations, it is ensured that hide the safety of SSID, further protect
Demonstrate,prove the corresponding encryption wireless networks of hiding SSID to be difficult to be easily found;And when encryption wireless network is connected into, can pass through
EAP authentication, this authentication mode has more motility, reliability, substantially increases the experience of user.
Compared with prior art, the beneficial effects of the present invention is:
A kind of wireless connection method and system of the present invention, provides the clothes of differentiation can to domestic consumer and VIP user
Business, allows VIP user to obtain more preferable any wireless network services, substantially increases the experience and satisfaction of VIP user.
Description of the drawings
Below by clearly understandable mode, preferred implementation is described with reference to the drawings, to a kind of wireless connection method and
The above-mentioned characteristic of system, technical characteristic, advantage and its implementation are further described.
Fig. 1 is the flow chart of wireless connection method one embodiment of the present invention;
Fig. 2 is the flow chart of another embodiment of wireless connection method of the present invention;
Fig. 3 is the flow chart of Fig. 2 step S310 one embodiment;
Fig. 4 is the structural representation of wireless connection system one embodiment of the present invention;
Fig. 5 is the structural representation of another embodiment of wireless connection system of the present invention;
Fig. 6 is the structural representation of another embodiment of wireless connection system of the present invention.
Drawing reference numeral explanation:
1000. wireless terminals, 1100. scanning elements, 1200. acquiring units, 1210. rule acquisition modules, 1211. parameters
Acquisition submodule, 1212. algorithm acquisition submodules, 1213. parameter algorithm acquisition submodules, 1214. algorithms search submodule,
1220.SSID acquisition modules, 1300. transmitting elements, 1400. receiving units, 1500. access units, 2000. wireless routers,
2100. feedback unit.
Specific embodiment
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below by control description of the drawings
The specific embodiment of the present invention.It should be evident that drawings in the following description are only some embodiments of the present invention, for
For those of ordinary skill in the art, on the premise of not paying creative work, can be obtaining other according to these accompanying drawings
Accompanying drawing, and obtain other embodiments.
To make simplified form, part related to the present invention is only schematically show in each figure, they are not represented
Its practical structures as product.In addition, so that simplified form is readily appreciated, with identical structure or function in some figures
Part, only symbolically depicts one of those, or has only marked one of those.Herein, " one " is not only represented
" only this ", it is also possible to represent the situation of " more than one ".
In one embodiment of the invention, as shown in figure 1, a kind of wireless connection method, including:Step S100 is scanned
To the non-encrypted wireless network of visible SSID;Step S300 obtains encrypting hiding for wireless network according to the visible SSID
SSID;Step S400 sends connection request letter by the hiding SSID to the corresponding wireless router of the encryption wireless network
Breath;Step S500 is successfully accessed the encryption wireless network when the request for receiving wireless router feedback passes through information.
Specifically, a non-encrypted wireless network is provided in wireless router, its SSID is visible, and another adds
Close wireless network, its SSID is hiding, allows wireless terminal to connect wireless router by two kinds of different modes.Purpose
It is externally to embody a wireless network, but different wireless terminal user (domestic consumer and VIP user, Huo Zheli can be supported
Xie Wei, nonregistered user and register user) connect wireless router using different modes.Because two class users are using different
Authentication mode and safe class, wireless router can provide different types of user the service of differentiation.Such as:It is non-registered
User can only access limited website and service, and register user can obtain complete internet access authority or internal services are visited
Ask authority.
The mode for distinguishing nonregistered user and register user can be by judging whether there is corresponding wireless on wireless terminal
Network connection application program, if any, the user for then illustrating contemporary wireless terminals is register user, can attempt obtaining hidden
Hide SSID.
The visible SSID of non-encrypted wireless network and the hiding SSID of encryption wireless network have corresponding relation, therefore, root
Obtain encrypting the hiding SSID of wireless network according to visible SSID.When wireless terminal wants to be connected into encryption wireless network, need to pass through
Related certification, for example:EAP authentication (EAP protocol), EAP is an authentication framework, is not a special authentication mechanism.EAP
Agreement is the core of IEEE802.1x authentication mechanisms, and it will realize that details transfers to attached EAP Method agreements to complete, and be based on
The certification of EAP protocol is used for corporate authentication, relative to PSK modes, can provide safer flexible authentication function.Only exist
When the request for receiving wireless router feedback passes through information, wireless terminal could successfully be connected into encryption wireless network, carry out
The operation of net.
Preferably, step S300 includes:Step S310 obtains corresponding according to the visible SSID and presetting database
Default transformational rule;Wherein, the default transformational rule includes:Operational parameter and the default transfer algorithm;Step S320
According to the visible SSID, the default transformational rule, the hiding SSID of the encryption wireless network is obtained.
Specifically, hiding SSID can be obtained according to visible SSID and default transformational rule, be this arrangement ensure that hiding
Correspondence between SSID and visible SSID, facilitates wireless terminal after scanning to non-encrypted wireless network, can quickly calculate
The hiding SSID of wireless network is encrypted accordingly, is easy to register user to be connected into encryption wireless network, obtained high-quality
Service.
Preferably, step S310 includes:Step S311 obtains the operational parameter included in the visible SSID;Step
S312 obtains the default transfer algorithm in the presetting database;Wherein, the presetting database only includes a kind of described default
Transfer algorithm;The default transfer algorithm is:Enciphered method is replaced, or, evolution method.
Specifically, it is seen that operational parameter can be included in SSID, and default transfer algorithm can be stored in presetting database
In, it should be noted that in order to ensure to obtain a corresponding hiding SSID according to a visible SSID, default transfer algorithm must
Must be a kind of, i.e., a kind of default transfer algorithm is only saved in presetting database, then coordinate operational parameter and visible SSID, obtain
Corresponding hiding SSID is arrived.Default transfer algorithm can be selected voluntarily, for example:1) enciphered method is replaced, is referred to, if visible
SSID is ABC-1, and 1 is operational parameter, refers to that ABC respectively adds one to be replaced accordingly according to the definition for replacing enciphered method, then
It is BCD to obtain hiding SSID;By that analogy, if visible SSID is ABC-2, it is CDE to hide SSID.2) evolution method, if
It can be seen that SSID is ABC-1,1 is operational parameter, and the definition of evolution method can be displaced to last position for first, and 1 represents this
The move mode of sample is BCA once, that is, to obtain hiding SSID;If it can be seen that SSID is ABC-2,2 represent movement twice, that is, obtain
Hiding SSID is CAB.Using operational parameter and default transfer algorithm obtain hide SSID, it is ensured that hide SSID be difficult crack
Property, it is ensured that the safety of encryption wireless network.Default transfer algorithm has many kinds, as long as guaranteeing according to operational parameter and can
See that SSID obtains corresponding hiding SSID, here, do not specify specifically with which kind of default transfer algorithm.
Preferably, step S310 includes:Step S313 obtains the operational parameter and calculation included in the visible SSID
Method is identified;Step S314 finds corresponding default transfer algorithm according to algorithm mark in the presetting database;Its
In, the presetting database includes at least one default transfer algorithm;Default conversion in the presetting database is calculated
Method includes following at least one:Replace enciphered method, evolution method.
Specifically, when identifying comprising algorithm in visible SSID, various default conversion calculations that are stored with presetting database are illustrated
Method, needs to find corresponding default transfer algorithm using this algorithm mark, this in visible SSID so as to obtain hiding SSID
Design comprising algorithm mark and operational parameter simultaneously, further ensure hiding SSID is difficult cracking.For example:Present count
Enciphered method and evolution method are replaced according to can be stored with storehouse simultaneously, when visible SSID is ABC-12,1 represents algorithm mark,
Corresponding is to replace enciphered method, and 2 is operational parameter, and therefore, it can obtain hiding SSID is CDE;When visible SSID is
During ABC-22, first 2 represents algorithm mark, and corresponding default transfer algorithm is evolution method, and second 2 is computing ginseng
Number, therefore, it can obtain hiding SSID is CAB.
Preferably, also include between step S100 and step S300:Step S200 judges whether to connect
Enter the non-encrypted wireless network, if so, then execution step S300, if it is not, then there is no the qualification of connection encryption wireless network,
It is immediately finished wireless connection.
Preferably, step S200 includes:Step S210 is to the corresponding wireless router of the non-encrypted wireless network
Send certification request information;Wherein, the certification request information includes:MAC Address;Step S220 is in when the MAC Address
During white list, then the certification of wireless router transmission is received by information, and be connected into the non-encrypted wireless network, and perform step
Rapid S300;When the MAC Address is not in white list, the certification refusal information of wireless router transmission is received, then do not had
There is the qualification of connection encryption wireless network, be immediately finished wireless connection.
Specifically, after the non-encrypted wireless network of scanning to visible SSID, this non-encrypted wireless network can be attached
Network, can be based on the authentication mode of WEB, for example in verification process:1) wireless terminal browser is opened, is input into any network address;
2) webpage automatic jumps to certification page, and the input mode such as usemame/password or cell-phone number/identifying code is verified;3) verify
After success, the Internet can be accessed.
Can also be sent to the MAC Address of wireless router to judge whether wireless terminal is according to wireless terminal
Wireless terminal in blacklist, if it is not, then allow wireless terminal to be successfully connected into non-encrypted wireless network being surfed the Net;If
If being, then wireless terminal is not eligible for being connected into all wireless networks of wireless router, including non-encrypted wireless network and plus
Close wireless network.After wireless terminal can be connected into non-encrypted wireless network, in other words, when wireless terminal has encryption nothing is connected into
During the qualification of gauze network, follow-up acquisition is hidden SSID and sends connectivity request message etc., and wireless network can be allowed to connect should
Completed with Automatic Program, manually performed without the need for user, it is simple, convenient.
Preferably, step S500 includes:Step S510 is sent the connectivity request message by wireless router
To cloud authentication server;Step S520 is when default connection request letter on the connectivity request message and cloud authentication server
When ceasing consistent, then receive cloud authentication server and information is passed through by the request that wireless router feeds back;Step S530 is when reception
When passing through information to the request fed back by the wireless router, it is successfully connected into the encryption wireless network.
Specifically, when hiding SSID has been obtained, wireless terminal just can be to the corresponding encryption wireless networks of this hiding SSID
The corresponding wireless router of network sends connectivity request message, and the connectivity request message for receiving is sent to high in the clouds by wireless router
Certificate server, when receive connectivity request message with default connectivity request message is consistent in cloud authentication server when, cloud
End certificate server to wireless router sends request by information, and wireless router will be asked by feedback of the information to undoubtedly again
Terminal, allows wireless terminal to be successfully connected into encryption wireless network, facilitates register user to carry out net operation.
Also include in step S520:When default connection request letter on the connectivity request message and cloud authentication server
When ceasing inconsistent, then receive cloud authentication server and information is refused by the request that wireless router feeds back, it is impossible to be connected to institute
State encryption wireless network.This explanation wireless terminal cannot be connected into encryption wireless network not over certification, when this,
Wireless terminal can only be connected into non-encrypted wireless network, obtain the network service of non-encrypted wireless network.
When wireless terminal is connected to encryption wireless network, EAP authentication mode can be based on, this authentication mode needs high in the clouds
Server is supported.Authentication mode based on EAP protocol for each user typically support to use independent usemame/password or
Certificate is authenticated, and so can carry out finer management to each register user.
In another embodiment of the present invention, as shown in Figure 2 and Figure 3, a kind of wireless connection method, including:Step S100
Scanning obtains the non-encrypted wireless network of visible SSID;Step S200 judges whether to have access to the non-encrypted wireless network,
If so, then execution step S300, if it is not, then not having the qualification of connection encryption wireless network, is immediately finished wireless connection;It is described
Step S200 includes:Step S210 to the corresponding wireless router of the non-encrypted wireless network sends certification request information;Its
In, the certification request information includes:MAC Address;Step S220 receives wireless when the MAC Address is in white list, then
The certification that router sends accesses the non-encrypted wireless network, and execution step S300 by information;When MAC ground
When location is not in white list, the certification refusal information of wireless router transmission is received, then there is no connection encryption wireless network
Qualification, be immediately finished wireless connection;Step S300 obtains encrypting the hiding SSID of wireless network according to the visible SSID;
Step S300 includes:Step S310 is preset accordingly transformational rule according to the visible SSID and presetting database;
Wherein, the default transformational rule includes:Operational parameter and the default transfer algorithm;Step S310 includes:Step
S311 obtains the operational parameter included in the visible SSID;The default conversion that step S312 is obtained in the presetting database is calculated
Method;Wherein, the presetting database only includes a kind of default transfer algorithm;The default transfer algorithm is:Replace encryption
Method, or, evolution method;Or, step S313 obtains the operational parameter and algorithm mark included in the visible SSID;Step
S314 finds corresponding default transfer algorithm according to algorithm mark in the presetting database;Wherein, it is described default
Data base includes at least one default transfer algorithm;Default transfer algorithm in the presetting database include it is following extremely
Few one kind:Replace enciphered method, evolution method;Step S320 obtains institute according to the visible SSID, the default transformational rule
State the hiding SSID of encryption wireless network;Step S400 is corresponding wireless to the encryption wireless network by the hiding SSID
Router sends connectivity request message;Step S500 successfully connects when the request for receiving wireless router feedback passes through information
Enter the encryption wireless network;Step S500 includes:Step S510 passes through wireless router, by the connectivity request message
It is sent to cloud authentication server;Step S520 please when default connection on the connectivity request message and cloud authentication server
When asking information consistent, then receive cloud authentication server and information is passed through by the request that wireless router feeds back;Step S530 is worked as
When receiving the request fed back by the wireless router by information, the encryption wireless network is successfully accessed.
Specifically, the present invention can allow different user to be connected into different wireless networks, so as to enjoy different network weights
Limit, makes businessman that the service of differentiation is provided to different users, substantially increases the satisfaction of register user.
In another embodiment of the present invention, as shown in figure 4, a kind of wireless connection system, including:Wireless terminal
1000, wireless router 2000;The wireless terminal 1000 includes:Scanning element 1100, obtains visible SSID's for scanning
Non-encrypted wireless network;Acquiring unit 1200, electrically connects with the scanning element 1100, and the acquiring unit 1200 is according to described
It can be seen that SSID, obtains encrypting the hiding SSID of wireless network;Transmitting element 1300, electrically connects with the acquiring unit 1200, institute
State transmitting element 1300 and connection request is sent to the corresponding wireless router of the encryption wireless network by the hiding SSID
Information;Receiving unit 1400, the request for receiving the wireless router feedback passes through information;Access unit 1500, with institute
State receiving unit 1400 to electrically connect, the access unit accesses the encryption wireless network;The wireless router 2000 includes:
Feedback unit 2100, for feeding back the request by information.
Specifically, after the non-encrypted wireless network that scanning obtains visible SSID, correspondence can be obtained according to visible SSID
Hiding SSID, so as to realize wireless terminal connection on hide SSID it is corresponding encryption wireless network purpose, make register user
Can obtain encrypting the network legal power of wireless network, substantially increase the experience of register user.
In another embodiment of the present invention, as shown in figure 5, a kind of wireless connection system, wireless terminal 1000, wirelessly
Router 2000;The wireless terminal 1000 includes:Scanning element 1100, for scanning the non-encrypted wireless of visible SSID is obtained
Network;Acquiring unit 1200, electrically connects with the scanning element 1100, the acquiring unit 1200 according to the visible SSID,
Obtain encrypting the hiding SSID of wireless network;The acquiring unit 1200 is specifically included:Rule acquisition module 1210, for basis
The visible SSID and presetting database, are preset accordingly transformational rule;Wherein, the default transformational rule includes:Fortune
Calculate parameter and default transfer algorithm;SSID acquisition modules 1220, electrically connect with the rule acquisition module 1210, for according to institute
Visible SSID, the default transformational rule are stated, the hiding SSID of the encryption wireless network is obtained;The rule acquisition module
1210 specifically include:Parameter acquiring submodule 1211, obtains the operational parameter included in the visible SSID;Algorithm obtains submodule
Block 1212, obtains the default transfer algorithm in the presetting database;Wherein, the presetting database only includes a kind of described pre-
If transfer algorithm;The default transfer algorithm is:Enciphered method is replaced, or, evolution method;Transmitting element 1300, obtains with described
Take unit 1200 to electrically connect, the transmitting element is by the hiding SSID to the corresponding wireless routing of the encryption wireless network
Device sends connectivity request message;Receiving unit 1400, the request for receiving the wireless router feedback passes through information;Access
Unit 1500, electrically connects with the receiving unit, and the access unit accesses the encryption wireless network;The wireless router
2000 include:Feedback unit 2100, for feeding back the request by information.
Specifically, hiding SSID is obtained according to visible SSID and default transformational rule, and operational parameter and default turn
Scaling method is necessary factor, when presetting database is only stored with a kind of default transfer algorithm, it is seen that SSID can only comprising fortune
Calculation parameter, the unique a kind of default transfer algorithm so in the operational parameter and presetting database included in visible SSID,
Hiding SSID accordingly is calculated, so as to be subsequently connected to the corresponding encryption wireless networks of hiding SSID.
In another embodiment of the present invention, as shown in fig. 6, a kind of wireless connection system, including:Wireless terminal
1000, wireless router 2000;The wireless terminal 1000 includes:Scanning element 1100, obtains visible SSID's for scanning
Non-encrypted wireless network;Acquiring unit 1200, electrically connects with the scanning element, and the acquiring unit is according to described visible
SSID, obtains encrypting the hiding SSID of wireless network;The acquiring unit 1200 is specifically included:Rule acquisition module 1210, uses
According to the visible SSID and presetting database, transformational rule is preset accordingly;Wherein, the default transformational rule bag
Include:Operational parameter and default transfer algorithm;SSID acquisition modules 1220, electrically connect, for basis with the rule acquisition module
The visible SSID, the default transformational rule, obtain the hiding SSID of the encryption wireless network;The rule acquisition module
1210 specifically include:Parameter algorithm acquisition submodule 1213, for obtaining the visible SSID in the operational parameter that includes and calculation
Method is identified;Algorithm searches submodule 1214, corresponding for being found in the presetting database according to algorithm mark
Default transfer algorithm;Wherein, the presetting database includes at least one default transfer algorithm;The presetting database
In default transfer algorithm include following at least one:Replace enciphered method, evolution method;Transmitting element 1300, obtains with described
Unit electrical connection is taken, the transmitting element is sent out by the hiding SSID to the corresponding wireless router of the encryption wireless network
Send connectivity request message;Receiving unit 1400, the request for receiving the wireless router feedback passes through information;Access unit
1500, electrically connect with the receiving unit, the access unit accesses the encryption wireless network;The wireless router 2000
Including:Feedback unit 2100, for feeding back the request by information.
Specifically, can be stored with various default transfer algorithms simultaneously in presetting database, and specifically using which kind of default turn
Scaling method come coordinate operational parameter and visible SSID obtain hide SSID, be based on be included in visible SSID algorithm mark come
It is determined that;Be stored with various default transfer algorithms in presetting database, it is ensured that default transfer algorithm will not be cracked easily, and
It can be seen that both having contained operational parameter in SSID, algorithm mark is also contains, certain interference effect is also served to cracker, allowed
Hard solution person quickly positions calculations parameter and algorithm cannot identify, many considerations, it is ensured that hide the safety of SSID, enter
Step ensure that the corresponding encryption wireless networks of hiding SSID are difficult to be easily found;And when encryption wireless network is connected into, can be with
By EAP authentication, this authentication mode has more motility, reliability, substantially increases the experience of user.
It should be noted that above-described embodiment can independent assortment as needed.The above is only the preferred of the present invention
Embodiment, it is noted that for those skilled in the art, in the premise without departing from the principle of the invention
Under, some improvements and modifications can also be made, these improvements and modifications also should be regarded as protection scope of the present invention.
Claims (10)
1. a kind of wireless connection method, it is characterised in that include:
The scanning of step S100 obtains the non-encrypted wireless network of visible SSID;
Step S300 obtains encrypting the hiding SSID of wireless network according to the visible SSID;
Step S400 sends connection request letter by the hiding SSID to the corresponding wireless router of the encryption wireless network
Breath;
Step S500 is successfully accessed the encryption wireless network when the request for receiving wireless router feedback passes through information.
2. wireless connection method as claimed in claim 1, it is characterised in that step S300 includes:
Step S310 is preset accordingly transformational rule according to the visible SSID and presetting database;
Wherein, the default transformational rule includes:Operational parameter and default transfer algorithm;
Step S320 obtains the hiding SSID of the encryption wireless network according to the visible SSID, the default transformational rule.
3. wireless connection method as claimed in claim 2, it is characterised in that step S310 includes:
Step S311 obtains the operational parameter included in the visible SSID;
Step S312 obtains the described default transfer algorithm in the presetting database;
Wherein, the presetting database only includes a kind of default transfer algorithm;
The default transfer algorithm is:
Enciphered method is replaced, or, evolution method.
4. wireless connection method as claimed in claim 2, it is characterised in that step S310 includes:
Step S313 obtains the operational parameter and algorithm mark included in the visible SSID;
Step S314 finds corresponding default transfer algorithm according to algorithm mark in the presetting database;
Wherein, the presetting database includes at least one default transfer algorithm;
Default transfer algorithm in the presetting database includes following at least one:
Replace enciphered method, evolution method.
5. wireless connection method as claimed in claim 1, its feature DIYU, between step S100 and step S300
Also include:
Step S200 judges whether to have access to the non-encrypted wireless network, if so, then execution step S300, if it is not, then not
Qualification with connection encryption wireless network, is immediately finished wireless connection.
6. wireless connection method as claimed in claim 5, it is characterised in that step S200 includes:
Step S210 to the corresponding wireless router of the non-encrypted wireless network sends certification request information;
Wherein, the certification request information includes:MAC Address;
Step S220 receives the certification of wireless router transmission by information when the MAC Address is in white list, then, and connects
Enter the non-encrypted wireless network, and execution step S300;When the MAC Address is not in white list, receive without circuit
The certification refusal information sent by device, then do not have the qualification of connection encryption wireless network, is immediately finished wireless connection.
7. the wireless connection method as described in claim 1-6 is arbitrary, it is characterised in that step S500 includes:
The connectivity request message is sent to cloud authentication server by step S510 by wireless router;
Step S520 then connects when default connectivity request message is consistent on the connectivity request message with cloud authentication server
Receive cloud authentication server and information is passed through by the request that wireless router feeds back;
Step S530 is successfully accessed described adding when the request fed back by the wireless router is received by information
Close wireless network.
8. a kind of wireless connection system of the wireless connection method using as described in claim 1-7 is arbitrary, it is characterised in that wrap
Include:
Wireless terminal, wireless router;
The wireless terminal includes:
Scanning element, for the non-encrypted wireless network that scanning obtains visible SSID;
Acquiring unit, electrically connects with the scanning element, and the acquiring unit obtains encrypting wireless network according to the visible SSID
The hiding SSID of network;
Transmitting element, electrically connects with the acquiring unit, and the transmitting element is wireless to the encryption by the hiding SSID
The corresponding wireless router of network sends connectivity request message;
Receiving unit, the request for receiving the wireless router feedback passes through information;
Access unit, electrically connects with the receiving unit, and the access unit accesses the encryption wireless network;
The wireless router includes:
Feedback unit, for feeding back the request by information.
9. wireless connection system as claimed in claim 8, it is characterised in that the acquiring unit is specifically included:
Rule acquisition module, for according to the visible SSID and presetting database, transformational rule being preset accordingly;
Wherein, the default transformational rule includes:Operational parameter and default transfer algorithm;
SSID acquisition modules, electrically connect with the rule acquisition module, for according to the visible SSID, the default conversion rule
Then, the hiding SSID of the encryption wireless network is obtained;
The rule acquisition module is specifically included:
Parameter acquiring submodule, obtains the operational parameter included in the visible SSID;
Algorithm acquisition submodule, obtains the default transfer algorithm in the presetting database;
Wherein, the presetting database only includes a kind of default transfer algorithm;
The default transfer algorithm is:
Enciphered method is replaced, or, evolution method.
10. wireless connection method as claimed in claim 8, it is characterised in that the acquiring unit is specifically included:
Rule acquisition module, for according to the visible SSID and presetting database, transformational rule being preset accordingly;
Wherein, the default transformational rule includes:Operational parameter and default transfer algorithm;
SSID acquisition modules, electrically connect with the rule acquisition module, for according to the visible SSID, the default conversion rule
Then, the hiding SSID of the encryption wireless network is obtained;
The rule acquisition module is specifically included:
Parameter algorithm acquisition submodule, for obtaining the visible SSID in the operational parameter that includes and algorithm mark;
Algorithm searches submodule, for corresponding default conversion to be found in the presetting database according to algorithm mark
Algorithm;
Wherein, the presetting database includes at least one default transfer algorithm;
Default transfer algorithm in the presetting database includes following at least one:
Replace enciphered method, evolution method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610909004.0A CN106572465B (en) | 2016-10-18 | 2016-10-18 | A kind of wireless connection method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610909004.0A CN106572465B (en) | 2016-10-18 | 2016-10-18 | A kind of wireless connection method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106572465A true CN106572465A (en) | 2017-04-19 |
CN106572465B CN106572465B (en) | 2019-07-30 |
Family
ID=58533801
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610909004.0A Active CN106572465B (en) | 2016-10-18 | 2016-10-18 | A kind of wireless connection method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106572465B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107182053A (en) * | 2017-06-08 | 2017-09-19 | 上海掌门科技有限公司 | A kind of method and apparatus for being used to connect hiding WAP |
CN108260107A (en) * | 2018-01-10 | 2018-07-06 | 广州二元科技有限公司 | A kind of bicycle built-in device unlocking method based on Wi-Fi |
CN110431868A (en) * | 2017-08-23 | 2019-11-08 | 华为技术有限公司 | A kind of connection method and terminal of Wi-Fi Hotspot |
CN111368272A (en) * | 2020-03-16 | 2020-07-03 | 珠海格力电器股份有限公司 | Space monitoring management system, method, storage medium and computer equipment |
GB2605149A (en) * | 2021-03-23 | 2022-09-28 | British Telecomm | Method of operating a network |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104113934A (en) * | 2014-07-25 | 2014-10-22 | 北京奇虎科技有限公司 | Router accessing method for communication equipment and accessing system |
CN104488303A (en) * | 2014-04-16 | 2015-04-01 | 华为终端有限公司 | Device and method for accessing to wireless network |
CN104717296A (en) * | 2015-03-25 | 2015-06-17 | 阳海龙 | Social contact interactive method, device, terminal and system |
CN104936181A (en) * | 2015-06-25 | 2015-09-23 | 杭州华三通信技术有限公司 | Access authentication method and device for connecting specified AP (Access Point) |
CN105554746A (en) * | 2016-03-08 | 2016-05-04 | 叶茂森 | WIFI local area network communication system based on encryption SSID (Service Set Identifier) |
-
2016
- 2016-10-18 CN CN201610909004.0A patent/CN106572465B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104488303A (en) * | 2014-04-16 | 2015-04-01 | 华为终端有限公司 | Device and method for accessing to wireless network |
CN104113934A (en) * | 2014-07-25 | 2014-10-22 | 北京奇虎科技有限公司 | Router accessing method for communication equipment and accessing system |
CN104717296A (en) * | 2015-03-25 | 2015-06-17 | 阳海龙 | Social contact interactive method, device, terminal and system |
CN104936181A (en) * | 2015-06-25 | 2015-09-23 | 杭州华三通信技术有限公司 | Access authentication method and device for connecting specified AP (Access Point) |
CN105554746A (en) * | 2016-03-08 | 2016-05-04 | 叶茂森 | WIFI local area network communication system based on encryption SSID (Service Set Identifier) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11057821B2 (en) | 2017-06-08 | 2021-07-06 | Shanghai Zhangmen Science And Technology Co., Ltd. | Method and device for connecting to hidden wireless access point |
CN107182053A (en) * | 2017-06-08 | 2017-09-19 | 上海掌门科技有限公司 | A kind of method and apparatus for being used to connect hiding WAP |
WO2018223908A1 (en) * | 2017-06-08 | 2018-12-13 | 上海掌门科技有限公司 | Method and device for connecting to hidden wireless access point |
CN107182053B (en) * | 2017-06-08 | 2019-06-07 | 上海掌门科技有限公司 | It is a kind of for connecting the method and apparatus of hiding wireless access point |
CN110113747A (en) * | 2017-06-08 | 2019-08-09 | 上海掌门科技有限公司 | It is a kind of for connecting the method and apparatus of hiding wireless access point |
US11277744B2 (en) | 2017-08-23 | 2022-03-15 | Huawei Technologies Co., Ltd. | Wi-Fi hotspot connection method and terminal |
CN110431868A (en) * | 2017-08-23 | 2019-11-08 | 华为技术有限公司 | A kind of connection method and terminal of Wi-Fi Hotspot |
CN108260107A (en) * | 2018-01-10 | 2018-07-06 | 广州二元科技有限公司 | A kind of bicycle built-in device unlocking method based on Wi-Fi |
CN111368272A (en) * | 2020-03-16 | 2020-07-03 | 珠海格力电器股份有限公司 | Space monitoring management system, method, storage medium and computer equipment |
CN111368272B (en) * | 2020-03-16 | 2021-07-20 | 珠海格力电器股份有限公司 | Space monitoring management system, method, storage medium and computer equipment |
GB2605149A (en) * | 2021-03-23 | 2022-09-28 | British Telecomm | Method of operating a network |
WO2022199963A1 (en) * | 2021-03-23 | 2022-09-29 | British Telecommunications Public Limited Company | Method of operating a network |
GB2605149B (en) * | 2021-03-23 | 2023-09-06 | British Telecomm | Method of operating a network |
Also Published As
Publication number | Publication date |
---|---|
CN106572465B (en) | 2019-07-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104767715B (en) | Access control method and equipment | |
CN104836787B (en) | System and method for Authentication Client website | |
CN103688565B (en) | The safe online registration and supply of the WI FI focuses of use device management agreement | |
CN106572465A (en) | Wireless connection method and system thereof | |
CN104168561B (en) | Hot spot configuration method, cut-in method and equipment in a kind of WLAN | |
US8533798B2 (en) | Method and system for controlling access to networks | |
CN1685694B (en) | Session key management for public wireless lan supporitng multiple virtual operators | |
JP4160049B2 (en) | Method and system for providing access to services of a second network through a first network | |
US7418591B2 (en) | Network configuration method and communication system and apparatus | |
CN108028829A (en) | For obtaining the method being initially accessed and relevant wireless device and network node to network | |
JP2018170010A (en) | Terminal authentication method and device to be used for mobile communication system | |
CN107567017B (en) | Wireless connection system, device and method | |
CN104994504A (en) | Secure and automatic connection to wireless network | |
JP2006517359A (en) | Method and apparatus for providing network service information to a mobile station over a wireless local area network | |
WO2006097041A1 (en) | A general authentication former and a method for implementing the authentication | |
CN106330445B (en) | Vehicle authentication method and device | |
JP6997886B2 (en) | Non-3GPP device access to core network | |
US10356651B2 (en) | Controlled connection of a wireless device to a network | |
CN104247485B (en) | Network application function authorization in Generic Bootstrapping Architecture | |
CN104869121B (en) | A kind of authentication method and device based on 802.1x | |
JP2023530896A (en) | Systems and methods for operating user devices with personalized identity module profiles | |
CN105451298A (en) | Network-sharing method and system, network access method and system, and electronic device | |
CN109391937A (en) | Acquisition methods, equipment and the system of public key | |
CN103685201A (en) | Method and system for WLAN user fixed network access | |
CN105101274B (en) | The configuration method and device of message pass-through mode |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 201203 Pudong New Area, Shanghai, China (Shanghai) free trade pilot area 899 9, 1-4 1-4 story 01 rooms. Applicant after: Shanghai PeopleNet Security Technology Co., Ltd. Address before: 201821 211 rooms, No. 1411, Yecheng Road, Jiading District, Shanghai Applicant before: Shanghai PeopleNet Security Technology Co., Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |