CN106572465B - A kind of wireless connection method and system - Google Patents
A kind of wireless connection method and system Download PDFInfo
- Publication number
- CN106572465B CN106572465B CN201610909004.0A CN201610909004A CN106572465B CN 106572465 B CN106572465 B CN 106572465B CN 201610909004 A CN201610909004 A CN 201610909004A CN 106572465 B CN106572465 B CN 106572465B
- Authority
- CN
- China
- Prior art keywords
- ssid
- wireless network
- wireless
- encryption
- algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/11—Allocation or use of connection identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
Abstract
The invention discloses a kind of wireless connection method and systems, comprising: step S100 scans to obtain the non-encrypted wireless network of visible SSID;Step S300 obtains the hiding SSID of encryption wireless network according to the visible SSID;Step S400 sends connectivity request message to the corresponding wireless router of the encryption wireless network by the hiding SSID;Step S500 is successfully accessed the encryption wireless network when the request for receiving wireless router feedback passes through information.A kind of wireless connection method of the invention and system can provide the service of differentiation to ordinary user and VIP user, allow VIP user to obtain better any wireless network services, substantially increase the usage experience and satisfaction of VIP user.
Description
Technical field
The present invention relates to wireless communication field more particularly to a kind of wireless connection method and systems.
Background technique
With the development of science and technology, the equipment such as mobile phone, tablet computer, laptop have become we live in it is indispensable
Few article, in order to there is better experience, they are owned by wireless connecting function, they can pass through Wi-Fi
(Wireless-Fidelity, Wireless Fidelity) accesses wireless network, so as to carry out internet communication.
Many non-encrypted wireless networks are had in present public arena, primarily to improve service quality, therefore, this
A little non-encrypted wireless networks are generally provided by each businessman, market.It is connected into wireless network in order to facilitate the wireless terminal of client, this
The SSID (Service Set Identifier, service set) of a little non-encrypted wireless networks is visible, this is just meaned
Businessman is that all clients provide is all identical service, differentiated service can not be provided according to different customers;And this
The non-encrypted wireless network of kind is generally used WEB authentication mode, and client oneself is needed to connect manually, and step is cumbersome.
Summary of the invention
The object of the present invention is to provide a kind of wireless connection method and systems, realize and provide difference to different types of user
The service of change, to improve the purpose of user experience.
Technical solution provided by the invention is as follows:
A kind of wireless connection method, comprising: step S100 scans to obtain the non-encrypted wireless network of visible SSID;Step
S300 obtains the hiding SSID of encryption wireless network according to the visible SSID;Step S400 passes through the hiding SSID to institute
It states the corresponding wireless router of encryption wireless network and sends connectivity request message;Step S500, which works as, receives wireless router feedback
Request when passing through information, be successfully accessed the encryption wireless network.
User gradation is divided into ordinary user and VIP user (it is also understood that nonregistered user and registration user), is
Ordinary user and VIP user provide different any wireless network services, to achieve the purpose that promote VIP user experience.Having
During body, wireless router provides a non-encrypted wireless network and encryption wireless network simultaneously, non-encrypted wireless network
SSID is visible, and is facilitated all users to connect and is used (including: ordinary user and VIP user), and encrypts wireless network
SSID is hiding, it is meant that not all people can access this encryption wireless network, ensure that the use of VIP user
Permission.The hiding SSID of the visible SSID of non-encrypted wireless network and encryption wireless network has corresponding relationship, can be according to can
See SSID, obtain hiding SSID, convenient for subsequent VIP user by encrypting wireless network in wireless terminal connection, obtains excellentization
Service.
Further, the step S300 includes: step S310 according to the visible SSID and presetting database, is obtained corresponding
Default transformation rule;Wherein, the default transformation rule includes: operational parameter and default transfer algorithm;Step S320 according to
The visible SSID, the default transformation rule obtain the hiding SSID of the encryption wireless network.
It can be seen that SSID and hiding SSID has corresponding relationship, it can be understood as, hiding SSID is to after visible SSID encryption
Form allow VIP user to be connected into encryption wireless network by default transfer algorithm and the available hiding SSID of operational parameter.
This default transformation rule guarantees that hiding SSID has certain encryption, reduces all users and cracks to obtain and hides SSID's
It may.
Further, the step S310 includes: that step S311 obtains the operational parameter for including in the visible SSID;Step
S312 obtains the default transfer algorithm in the presetting database;Wherein, the presetting database only includes described in one kind
Default transfer algorithm;The default transfer algorithm are as follows: replacement enciphered method, or, evolution method.
Operational parameter may be embodied in visible SSID, and default transfer algorithm can be stored in advance in presetting database
In, it because can only be stored with a kind of default transfer algorithm, and include that operational parameter in visible SSID also only exists a kind of feelings
Therefore condition can only obtain a hiding SSID, guarantee the feasibility for being correctly connected into encryption wireless network.
Further, the step S310 includes: that step S313 obtains the operational parameter for including and calculation in the visible SSID
Method mark;Step S314 finds corresponding default transfer algorithm according to algorithm mark in the presetting database;Its
In, it include at least one default transfer algorithm in the presetting database;Default conversion in the presetting database is calculated
Method includes following at least one: replacement enciphered method, evolution method.
When there are many when default transfer algorithm for storage simultaneously in presetting database, it is seen that can not only join comprising operation in SSID
Number can also be identified comprising algorithm, found corresponding default transfer algorithm in the preset database using algorithm mark, obtained hidden
Hide SSID.The storage of a variety of default transfer algorithms further ensures hiding SSID and is not easy to be cracked, to ensure that offer is poor
The possibility of alienation any wireless network services.
Further, between the step S100 and the step S300 further include: step S200 judges whether to have access to
The non-encrypted wireless network, if it is not, not having the qualification of connection encryption wireless network then, is stood if so, thening follow the steps S300
Terminate to be wirelessly connected.
Before carrying out that hiding SSID is calculated, the identity of wireless terminal is also further judged, if wireless terminal connects
Non-encrypted wireless network can not all connect, then it just less qualified can even encrypt wireless network, the setting resistance of this step
The possibility that certain wireless terminals in blacklist are connected into encryption wireless network has been blocked, ensure that the safety of encryption wireless network
Property.
Further, the step S200 includes: step S210 to the corresponding wireless router of the non-encrypted wireless network
Send certification request information;Wherein, the certification request information includes: MAC Address;Step S220 is in when the MAC Address
When white list, then the authentication pass information of wireless router transmission is received, and accesses the non-encrypted wireless network, and execute step
Rapid S300;When the MAC Address is not in white list, the certification refusal information of wireless router transmission is received, then is not had
There is the qualification of connection encryption wireless network, is immediately finished wireless connection.
Specifically judging whether wireless terminal can be connected into non-encrypted wireless network, is being to make wireless router judgement current wireless
Whether the MAC Address of terminal is in blacklist, if it does, then wireless terminal will not be allowed to be connected into non-encrypted wireless network,
More this wireless terminal cannot be allowed to be connected into encryption wireless network;And if the MAC Address of wireless terminal is not in blacklist, just
Wireless terminal can be allowed successfully to be connected into non-encrypted wireless network, encryption wireless network subsequent can be connected into for wireless terminal and provide base
Plinth.
Further, the step S500 includes: step S510 by wireless router, and the connectivity request message is sent
To cloud authentication server;Step S520 is when connection request letter preset on the connectivity request message and cloud authentication server
When ceasing consistent, then cloud authentication server is received by the request that wireless router is fed back and passes through information;Step S530 is when reception
When passing through information to the request fed back by the wireless router, it is successfully accessed the encryption wireless network.
When wireless terminal is connected into encryption wireless network, EAP (Extensible Authentication is generally used
Protocol, extensible authentication protocol) authentication mode, it needs just complete by the help of cloud authentication server whole
A verification process provides safer flexible authentication function;And the introducing of cloud authentication server also facilitates and VIP is used
The specific management at family, guarantee allow VIP user to enjoy quality services.
The present invention also provides a kind of wireless connection systems, comprising: wireless terminal, wireless router;The wireless terminal packet
Include: scanning element obtains the non-encrypted wireless network of visible SSID for scanning;Acquiring unit is electrically connected with the scanning element
It connects, the acquiring unit obtains the hiding SSID of encryption wireless network according to the visible SSID;Transmission unit is obtained with described
Unit is taken to be electrically connected, the transmission unit is sent out by the hiding SSID to the corresponding wireless router of the encryption wireless network
Send connectivity request message;Receiving unit, the request for receiving the wireless router feedback pass through information;Access unit, with
The receiving unit electrical connection, the access unit access the encryption wireless network;The wireless router includes: feedback
Member passes through information for feeding back the request.
After scanning obtains the non-encrypted wireless network of visible SSID, corresponding hide can be obtained according to visible SSID
SSID obtains registration user to realize the purpose for hiding the corresponding encryption wireless network of SSID in wireless terminal connection
To the network legal power of encryption wireless network, the usage experience of registration user is substantially increased.
Further, the acquiring unit specifically includes: rule acquisition module, for according to the visible SSID and present count
According to library, obtain presetting transformation rule accordingly;Wherein, the default transformation rule includes: operational parameter and default transfer algorithm;
SSID obtains module, is electrically connected with the rule acquisition module, is used for according to the visible SSID, the default transformation rule,
Obtain the hiding SSID of the encryption wireless network;The rule acquisition module specifically includes: parameter acquisition submodule, obtains institute
State the operational parameter for including in visible SSID;Algorithm acquisition submodule obtains the default transfer algorithm in the presetting database;
Wherein, the presetting database only includes a kind of default transfer algorithm;The default transfer algorithm are as follows: replacement enciphered method,
Or, evolution method.
Hiding SSID is to be obtained according to visible SSID and default transformation rule, and operational parameter and default transfer algorithm are
Necessary factor, when presetting database is only stored with a kind of default transfer algorithm, it is seen that SSID can only include operational parameter, this
Phase is calculated according to unique a kind of default transfer algorithm in the operational parameter and presetting database for including in visible SSID in sample
The hiding SSID answered, to carry out subsequent being connected to the corresponding encryption wireless network of hiding SSID.
Further, the acquiring unit specifically includes: rule acquisition module, for according to the visible SSID and present count
According to library, obtain presetting transformation rule accordingly;Wherein, the default transformation rule includes: operational parameter and default transfer algorithm;
SSID obtains module, is electrically connected with the rule acquisition module, is used for according to the visible SSID, the default transformation rule,
Obtain the hiding SSID of the encryption wireless network;The rule acquisition module specifically includes: parameter algorithm acquisition submodule, uses
The operational parameter and algorithm mark for including in the acquisition visible SSID;Algorithm searches submodule, for according to the algorithm
Mark finds corresponding default transfer algorithm in the presetting database;It wherein, include at least in the presetting database
A kind of default transfer algorithm;Default transfer algorithm in the presetting database includes following at least one: replacement encryption
Method, evolution method.
Can store that there are many default transfer algorithms in presetting database simultaneously, and specifically using which kind of preset transfer algorithm come
Cooperation operational parameter and visible SSID obtain hiding SSID, are determined based on including the algorithm mark in visible SSID;
Storage ensure that default transfer algorithm will not be cracked easily there are many default transfer algorithm in presetting database, and visible
Both operational parameter is contained in SSID, also contains algorithm mark, certain interference effect is also played to cracker, allows hard solution
Person quickly positions calculations parameter and algorithm mark, various considerations can not ensure that the safety of hiding SSID, further protect
The corresponding encryption wireless network of hiding SSID has been demonstrate,proved to be not easy to be easily found;And when being connected into encryption wireless network, it can pass through
EAP authentication, this authentication mode have more flexibility, reliability, substantially increase the usage experience of user.
Compared with prior art, the beneficial effects of the present invention are:
A kind of wireless connection method of the invention and system can provide the clothes of differentiation to ordinary user and VIP user
Business, allows VIP user to obtain better any wireless network services, substantially increases the usage experience and satisfaction of VIP user.
Detailed description of the invention
Below by clearly understandable mode, preferred embodiment is described with reference to the drawings, to a kind of wireless connection method and
Above-mentioned characteristic, technical characteristic, advantage and its implementation of system are further described.
Fig. 1 is the flow chart of wireless connection method one embodiment of the present invention;
Fig. 2 is the flow chart of another embodiment of wireless connection method of the present invention;
Fig. 3 is the flow chart of Fig. 2 step S310 one embodiment;
Fig. 4 is the structural schematic diagram of wireless connection system one embodiment of the present invention;
Fig. 5 is the structural schematic diagram of another embodiment of wireless connection system of the present invention;
Fig. 6 is the structural schematic diagram of another embodiment of wireless connection system of the present invention.
Drawing reference numeral explanation:
1000. wireless terminals, 1100. scanning elements, 1200. acquiring units, 1210. rule acquisition modules, 1211. parameters
Acquisition submodule, 1212. algorithm acquisition submodules, 1213. parameter algorithm acquisition submodules, 1214. algorithms search submodule,
1220.SSID acquisition module, 1300. transmission units, 1400. receiving units, 1500. access units, 2000. wireless routers,
2100. feedback unit.
Specific embodiment
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, Detailed description of the invention will be compareed below
A specific embodiment of the invention.It should be evident that drawings in the following description are only some embodiments of the invention, for
For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other
Attached drawing, and obtain other embodiments.
To make simplified form, part related to the present invention is only schematically shown in each figure, they are not represented
Its practical structures as product.In addition, there is identical structure or function in some figures so that simplified form is easy to understand
Component only symbolically depicts one of those, or has only marked one of those.Herein, "one" is not only indicated
" only this ", can also indicate the situation of " more than one ".
In one embodiment of the invention, as shown in Figure 1, a kind of wireless connection method, comprising: step S100 is scanned
To the non-encrypted wireless network of visible SSID;Step S300 obtains hiding for encryption wireless network according to the visible SSID
SSID;Step S400 sends connection request letter to the corresponding wireless router of the encryption wireless network by the hiding SSID
Breath;Step S500 is successfully accessed the encryption wireless network when the request for receiving wireless router feedback passes through information.
Specifically, providing a non-encrypted wireless network in wireless router, SSID is visible and another adds
Close wireless network, SSID be it is hiding, so that wireless terminal is connected wireless router by two different modes.Purpose
It is one wireless network of external embodiment, but can supports different wireless terminal users (ordinary user and VIP user, Huo Zheli
Xie Wei, nonregistered user and registration user) using different modes connect wireless router.Since two class users are using different
Authentication mode and security level, wireless router can provide the service of differentiation to different types of user.Such as: it is non-registered
User can only access limited website and service, and the available complete internet access permission of registration user or internal services are visited
Ask permission.
Whether the mode for distinguishing nonregistered user and registration user can be corresponding wireless by judging to have on wireless terminal
It is connected to the network application program, if any, then illustrate that the user of contemporary wireless terminals for registration user, can attempt to obtain hidden
Hide SSID.
The visible SSID of non-encrypted wireless network and the hiding SSID of encryption wireless network have corresponding relationship, therefore, root
The hiding SSID of encryption wireless network is obtained according to visible SSID.When wireless terminal is wanted to be connected into encryption wireless network, need to pass through
Relevant certification, such as: EAP authentication (EAP protocol), EAP are an authentication frameworks, are not a special authentication mechanisms.EAP
Agreement is the core of IEEE802.1x authentication mechanism, it will realize that details transfers to attached EAP Method agreement to complete, and is based on
The certification of EAP protocol is chiefly used in corporate authentication, relative to PSK mode, can provide safer flexible authentication function.Only exist
The request of wireless router feedback is received when passing through information, wireless terminal could successfully be connected into encryption wireless network, carry out
The operation of net.
Preferably, the step S300 includes: step S310 according to the visible SSID and presetting database, is obtained corresponding
Default transformation rule;Wherein, the default transformation rule includes: operational parameter and the default transfer algorithm;Step S320
According to the visible SSID, the default transformation rule, the hiding SSID of the encryption wireless network is obtained.
Specifically, hiding SSID can obtain according to visible SSID and default transformation rule, this arrangement ensure that hiding
Correspondence between SSID and visible SSID facilitates wireless terminal after scanning to non-encrypted wireless network, can quickly calculate
The hiding SSID for encrypting wireless network accordingly is obtained, encryption wireless network can be connected into convenient for registration user, obtained good
Service.
Preferably, the step S310 includes: that step S311 obtains the operational parameter for including in the visible SSID;Step
S312 obtains the default transfer algorithm in the presetting database;Wherein, the presetting database only includes a kind of described default
Transfer algorithm;The default transfer algorithm are as follows: replacement enciphered method, or, evolution method.
Specifically, may include operational parameter in visible SSID, and default transfer algorithm can store in presetting database
In, it should be noted that in order to guarantee to obtain a corresponding hiding SSID according to a visible SSID, default transfer algorithm must
It must be one kind, i.e., only save a kind of default transfer algorithm in presetting database, then cooperate operational parameter and visible SSID, obtain
Corresponding hiding SSID is arrived.Default transfer algorithm can be selected voluntarily, such as: 1) enciphered method is replaced, is referred to, if visible
SSID is ABC-1, and 1 is operational parameter, refers to that ABC respectively adds one to be replaced accordingly according to the definition of replacement enciphered method, then
It obtains hiding SSID being BCD;And so on, if visible SSID is ABC-2, hiding SSID is CDE.2) evolution method, if
It can be seen that SSID is ABC-1,1 is operational parameter, and the definition of evolution method can be displaced to last position for first, and 1 indicates this
The move mode of sample is once to get being BCA to hiding SSID;If indicating mobile twice to get arriving it can be seen that SSID is ABC-2,2
Hiding SSID is CAB.It obtains hiding SSID using operational parameter and default transfer algorithm, ensure that hiding SSID is not easy to crack
Property, it ensure that the safety of encryption wireless network.There are many kinds of default transfer algorithms, as long as guaranteeing according to operational parameter and can
See that SSID obtains corresponding hiding SSID, herein, does not provide which kind of specifically presets transfer algorithm with.
Preferably, the step S310 includes: that step S313 obtains the operational parameter for including and calculation in the visible SSID
Method mark;Step S314 finds corresponding default transfer algorithm according to algorithm mark in the presetting database;Its
In, it include at least one default transfer algorithm in the presetting database;Default conversion in the presetting database is calculated
Method includes following at least one: replacement enciphered method, evolution method.
Specifically, illustrating that there are many default conversions to calculate for storage in presetting database when identifying in visible SSID comprising algorithm
Method is needed to be identified using this algorithm and finds corresponding default transfer algorithm, thus obtain hiding SSID, it is this in visible SSID
Design simultaneously comprising algorithm mark and operational parameter, further ensure hiding SSID is not easy cracking.Such as: present count
According to that can be stored with replacement enciphered method and evolution method in library simultaneously, when visible SSID is ABC-12,1 indicates algorithm mark,
Corresponding is replacement enciphered method, and 2 are operational parameters, and therefore, available hiding SSID is CDE;When visible SSID is
When ABC-22, first 2 expression algorithm mark, corresponding default transfer algorithm is evolution method, and second 2 is operation ginseng
Number, therefore, available hiding SSID are CAB.
Preferably, between the step S100 and the step S300 further include: step S200 judges whether to connect
Enter the non-encrypted wireless network, if so, S300 is thened follow the steps, if it is not, do not have the qualification of connection encryption wireless network then,
It is immediately finished wireless connection.
Preferably, the step S200 includes: step S210 to the corresponding wireless router of the non-encrypted wireless network
Send certification request information;Wherein, the certification request information includes: MAC Address;Step S220 is in when the MAC Address
When white list, then the authentication pass information of wireless router transmission is received, and is connected into the non-encrypted wireless network, and execute step
Rapid S300;When the MAC Address is not in white list, the certification refusal information of wireless router transmission is received, then is not had
There is the qualification of connection encryption wireless network, is immediately finished wireless connection.
Specifically, this non-encrypted wireless network can be attached after the non-encrypted wireless network of visible SSID is arrived in scanning
Network, in verification process can based on the authentication mode of WEB, such as: 1) open wireless terminal browser, input any network address;
2) webpage automatic jumps to certification page, and the input modes such as usemame/password or cell-phone number/identifying code are verified;3) it verifies
After success, accessible internet.
It can also be sent to the MAC Address of wireless router, according to wireless terminal to judge whether wireless terminal is in
Wireless terminal in blacklist is surfed the Internet if it is not, wireless terminal is then allowed successfully to be connected into non-encrypted wireless network;If
If being, then wireless terminal is not eligible for being connected into all wireless networks of wireless router, including non-encrypted wireless network and plus
Close wireless network.After wireless terminal can be connected into non-encrypted wireless network, in other words, encryption nothing is connected into when wireless terminal has
When the qualification of gauze network, subsequent obtain hides SSID and sends connectivity request message etc., wireless network connection can be allowed to answer
It is automatically performed with program, is manually performed without user, it is simple, convenient.
Preferably, the step S500 includes: step S510 by wireless router, and the connectivity request message is sent
To cloud authentication server;Step S520 is when connection request letter preset on the connectivity request message and cloud authentication server
When ceasing consistent, then cloud authentication server is received by the request that wireless router is fed back and passes through information;Step S530 is when reception
When passing through information to the request fed back by the wireless router, it is successfully connected into the encryption wireless network.
Specifically, wireless terminal can hide the corresponding encryption wireless network of SSID to this when having obtained hiding SSID
The corresponding wireless router of network sends connectivity request message, and the connectivity request message received is sent to cloud by wireless router
Certificate server, when received connectivity request message is consistent with connectivity request message preset in cloud authentication server, cloud
Certificate server is held to send request by information to wireless router, wireless router is again fed back to request undoubtedly by information
Terminal allows wireless terminal to be successfully connected into encryption wireless network, and registration user is facilitated to carry out net operation.
In step S520 further include: when connection request preset on the connectivity request message and cloud authentication server is believed
When ceasing inconsistent, then cloud authentication server is received by the request that wireless router is fed back and refuses information, cannot connect to institute
State encryption wireless network.This illustrates that wireless terminal not over certification, therefore can not be connected into encryption wireless network, when this,
Wireless terminal can only be connected into non-encrypted wireless network, obtain the network service of non-encrypted wireless network.
When wireless terminal is connected to encryption wireless network, it can be based on EAP authentication mode, this authentication mode needs cloud
Server is supported.Each user is generally supported based on the authentication mode of EAP protocol using independent usemame/password or
Certificate is authenticated, and can carry out finer management to each registration user in this way.
In another embodiment of the present invention, as shown in Figure 2 and Figure 3, a kind of wireless connection method, comprising: step S100
Scanning obtains the non-encrypted wireless network of visible SSID;Step S200 judges whether to have access to the non-encrypted wireless network,
If so, thening follow the steps S300, if it is not, not having the qualification of connection encryption wireless network then, it is immediately finished wireless connection;It is described
Step S200, which includes: step S210, sends certification request information to the corresponding wireless router of the non-encrypted wireless network;Its
In, the certification request information includes: MAC Address;Step S220 is then received wireless when the MAC Address is in white list
The authentication pass information that router is sent, and the non-encrypted wireless network is accessed, and execute step S300;As the MAC
When location is not in white list, the certification refusal information of wireless router transmission is received, then does not have connection encryption wireless network
Qualification, be immediately finished wireless connection;Step S300 obtains the hiding SSID of encryption wireless network according to the visible SSID;
The step S300 includes: step S310 according to the visible SSID and presetting database, obtains presetting transformation rule accordingly;
Wherein, the default transformation rule includes: operational parameter and the default transfer algorithm;The step S310 includes: step
S311 obtains the operational parameter for including in the visible SSID;Step S312 obtains the calculation of the default conversion in the presetting database
Method;Wherein, the presetting database only includes a kind of default transfer algorithm;The default transfer algorithm are as follows: replacement encryption
Method, or, evolution method;Or, step S313 obtains the operational parameter for including in the visible SSID and algorithm mark;Step
S314 finds corresponding default transfer algorithm according to algorithm mark in the presetting database;Wherein, described default
It include at least one default transfer algorithm in database;Default transfer algorithm in the presetting database include it is following extremely
Few one kind: replacement enciphered method, evolution method;Step S320 obtains institute according to the visible SSID, the default transformation rule
State the hiding SSID of encryption wireless network;Step S400 is corresponding wireless to the encryption wireless network by the hiding SSID
Router sends connectivity request message;Step S500 successfully connects when the request for receiving wireless router feedback passes through information
Enter the encryption wireless network;The step S500 includes: step S510 by wireless router, by the connectivity request message
It is sent to cloud authentication server;Step S520, which works as preset connection in the connectivity request message and cloud authentication server, to be asked
When asking information consistent, then cloud authentication server is received by the request that wireless router is fed back and passes through information;Step S530 works as
It receives when passing through information by the request that the wireless router is fed back, is successfully accessed the encryption wireless network.
Specifically, the present invention can allow different user to be connected into different wireless networks, to enjoy different network weights
Limit makes businessman provide the service of differentiation to different users, substantially increases the satisfaction of registration user.
In another embodiment of the present invention, as shown in figure 4, a kind of wireless connection system, comprising: wireless terminal
1000, wireless router 2000;The wireless terminal 1000 includes: scanning element 1100, obtains visible SSID's for scanning
Non-encrypted wireless network;Acquiring unit 1200 is electrically connected with the scanning element 1100, and the acquiring unit 1200 is according to described
It can be seen that SSID, obtains the hiding SSID of encryption wireless network;Transmission unit 1300 is electrically connected, institute with the acquiring unit 1200
It states transmission unit 1300 and connection request is sent to the corresponding wireless router of the encryption wireless network by the hiding SSID
Information;Receiving unit 1400, the request for receiving the wireless router feedback pass through information;Access unit 1500, with institute
The electrical connection of receiving unit 1400 is stated, the access unit accesses the encryption wireless network;The wireless router 2000 includes:
Feedback unit 2100 passes through information for feeding back the request.
Specifically, can be corresponded to according to visible SSID after scanning obtains the non-encrypted wireless network of visible SSID
Hiding SSID, thus realize wireless terminal connection on hide SSID it is corresponding encryption wireless network purpose, make register user
The network legal power of available encryption wireless network, substantially increases the usage experience of registration user.
In another embodiment of the present invention, as shown in figure 5, a kind of wireless connection system, wireless terminal 1000, wirelessly
Router 2000;The wireless terminal 1000 includes: scanning element 1100, obtains the non-encrypted wireless of visible SSID for scanning
Network;Acquiring unit 1200 is electrically connected with the scanning element 1100, the acquiring unit 1200 according to the visible SSID,
Obtain the hiding SSID of encryption wireless network;The acquiring unit 1200 specifically includes: rule acquisition module 1210, is used for basis
The visible SSID and presetting database obtain presetting transformation rule accordingly;Wherein, the default transformation rule includes: fortune
Calculate parameter and default transfer algorithm;SSID obtains module 1220, is electrically connected with the rule acquisition module 1210, for according to institute
Visible SSID, the default transformation rule are stated, the hiding SSID of the encryption wireless network is obtained;The rule acquisition module
1210 specifically include: parameter acquisition submodule 1211, obtain the operational parameter for including in the visible SSID;Algorithm obtains submodule
Block 1212 obtains the default transfer algorithm in the presetting database;Wherein, the presetting database only includes a kind of described pre-
If transfer algorithm;The default transfer algorithm are as follows: replacement enciphered method, or, evolution method;Transmission unit 1300 is obtained with described
Unit 1200 is taken to be electrically connected, the transmission unit passes through the hiding SSID to the corresponding wireless routing of the encryption wireless network
Device sends connectivity request message;Receiving unit 1400, the request for receiving the wireless router feedback pass through information;Access
Unit 1500 is electrically connected with the receiving unit, and the access unit accesses the encryption wireless network;The wireless router
2000 include: feedback unit 2100, passes through information for feeding back the request.
Specifically, hiding SSID is to be obtained according to visible SSID and default transformation rule, and operational parameter turns with default
Scaling method is necessary factor, when presetting database is only stored with a kind of default transfer algorithm, it is seen that SSID can be only comprising fortune
Parameter is calculated, in this way according to unique a kind of default transfer algorithm in the operational parameter and presetting database for including in visible SSID,
Hiding SSID accordingly is calculated, to carry out subsequent being connected to the corresponding encryption wireless network of hiding SSID.
In another embodiment of the present invention, as shown in fig. 6, a kind of wireless connection system, comprising: wireless terminal
1000, wireless router 2000;The wireless terminal 1000 includes: scanning element 1100, obtains visible SSID's for scanning
Non-encrypted wireless network;Acquiring unit 1200 is electrically connected with the scanning element, and the acquiring unit is according to described visible
SSID obtains the hiding SSID of encryption wireless network;The acquiring unit 1200 specifically includes: rule acquisition module 1210, uses
According to the visible SSID and presetting database, obtaining presetting transformation rule accordingly;Wherein, the default transformation rule packet
It includes: operational parameter and default transfer algorithm;SSID obtains module 1220, is electrically connected with the rule acquisition module, is used for basis
The visible SSID, the default transformation rule obtain the hiding SSID of the encryption wireless network;The rule acquisition module
1210 specifically include: parameter algorithm acquisition submodule 1213, for obtaining the operational parameter for including in the visible SSID and calculation
Method mark;Algorithm searches submodule 1214, corresponding for being found in the presetting database according to algorithm mark
Default transfer algorithm;It wherein, include at least one default transfer algorithm in the presetting database;The presetting database
In default transfer algorithm include following at least one: replacement enciphered method, evolution method;Transmission unit 1300 is obtained with described
Unit is taken to be electrically connected, the transmission unit is sent out by the hiding SSID to the corresponding wireless router of the encryption wireless network
Send connectivity request message;Receiving unit 1400, the request for receiving the wireless router feedback pass through information;Access unit
1500, it is electrically connected with the receiving unit, the access unit accesses the encryption wireless network;The wireless router 2000
Include: feedback unit 2100, passes through information for feeding back the request.
Specifically, can store simultaneously in presetting database, there are many default transfer algorithms, and specifically utilize which kind of default turn
Scaling method cooperates the operational parameter and visible SSID to obtain hiding SSID, be based on include algorithm in visible SSID identify come
Determining;Storage ensure that default transfer algorithm will not be cracked easily there are many default transfer algorithm in presetting database, and
It can be seen that both containing operational parameter in SSID, algorithm mark is also contained, certain interference effect is also played to cracker, is allowed
Hard solution person can not quickly positions calculations parameter and algorithm identify, and various considerations ensure that the safety of hiding SSID, into one
Step ensure that the corresponding encryption wireless network of hiding SSID is not easy to be easily found;It, can be with and when being connected into encryption wireless network
By EAP authentication, this authentication mode has more flexibility, reliability, substantially increases the usage experience of user.
It should be noted that above-described embodiment can be freely combined as needed.The above is only of the invention preferred
Embodiment, it is noted that for those skilled in the art, in the premise for not departing from the principle of the invention
Under, several improvements and modifications can also be made, these modifications and embellishments should also be considered as the scope of protection of the present invention.
Claims (5)
1. a kind of wireless connection method characterized by comprising
Step S100 scans to obtain the non-encrypted wireless network of visible SSID;
Step S300 judges whether there is corresponding wireless network connection application program, if so, then being obtained according to the visible SSID
Encrypt the hiding SSID of wireless network;
Step S400 sends connection request letter to the corresponding wireless router of the encryption wireless network by the hiding SSID
Breath;
Step S500 is successfully accessed the encryption wireless network when the request for receiving wireless router feedback passes through information;
Wherein, described to be specifically included according to the visible SSID, the hiding SSID for obtaining encryption wireless network:
Step S310 obtains presetting transformation rule accordingly according to the visible SSID and presetting database;Wherein, described default
Transformation rule includes: operational parameter and default transfer algorithm;
Step S320 obtains the hiding SSID of the encryption wireless network according to the visible SSID, the default transformation rule;
The step S310 includes:
Step S311 obtains the operational parameter for including in the visible SSID;
Step S312 obtains the default transfer algorithm in the presetting database;
Wherein, the presetting database only includes a kind of default transfer algorithm;
The default conversion transfer algorithm are as follows: replacement enciphered method, or, place-exchange method;
Or;
Step S313 obtains the operational parameter for including in the visible SSID and algorithm mark;
Step S314 finds corresponding default transfer algorithm according to algorithm mark in the presetting database;
It wherein, include at least one default transfer algorithm in the presetting database;
Default transfer algorithm in the presetting database includes following at least one:
Replace enciphered method, evolution method.
2. wireless connection method as described in claim 1, characteristically between the step S100 and the step S300
Further include:
Step S200 judges whether to have access to the non-encrypted wireless network, if so, S300 is thened follow the steps, if it is not, then not
Qualification with connection encryption wireless network, is immediately finished wireless connection.
3. wireless connection method as claimed in claim 2, which is characterized in that the step S200 includes:
Step S210 sends certification request information to the corresponding wireless router of the non-encrypted wireless network;
Wherein, the certification request information includes: MAC Address;
Step S220 then receives the authentication pass information of wireless router transmission when the MAC Address is in white list, and connects
Enter the non-encrypted wireless network, and executes step S300;When the MAC Address is not in white list, no route is received
Information is refused by the certification that device is sent, then does not have the qualification of connection encryption wireless network, is immediately finished wireless connection.
4. wireless connection method a method according to any one of claims 1-3, which is characterized in that the step S500 includes:
The connectivity request message is sent to cloud authentication server by wireless router by step S510;
Step S520 then connects when the connectivity request message is consistent with connectivity request message preset in cloud authentication server
It receives cloud authentication server and information is passed through by the request that wireless router is fed back;
Step S530 when receive information is passed through by the request that the wireless router is fed back when, be successfully accessed it is described plus
Close wireless network.
5. a kind of wireless connection system using the wireless connection method as described in claim 1-4 is any, which is characterized in that packet
It includes:
Wireless terminal, wireless router;
The wireless terminal includes: scanning element, obtains the non-encrypted wireless network of visible SSID for scanning;
Judging unit, for judging whether there is corresponding wireless network connection application program;
Acquiring unit is electrically connected with the scanning element, and the acquiring unit is used to have corresponding wireless network connection when judgement
When application program, according to the visible SSID, the hiding SSID of encryption wireless network is obtained;
Transmission unit is electrically connected with the acquiring unit, and the transmission unit is wireless to the encryption by the hiding SSID
The corresponding wireless router of network sends connectivity request message;
Receiving unit, the request for receiving the wireless router feedback pass through information;
Access unit is electrically connected with the receiving unit, and the access unit accesses the encryption wireless network;
The wireless router includes:
Feedback unit passes through information for feeding back the request;
The acquiring unit specifically includes:
Rule acquisition module, for obtaining presetting transformation rule accordingly according to the visible SSID and presetting database;
Wherein, the default transformation rule includes: operational parameter and default transfer algorithm;
SSID obtains module, is electrically connected with the rule acquisition module, for being advised according to the visible SSID, the default conversion
Then, the hiding SSID of the encryption wireless network is obtained;
The rule acquisition module specifically includes:
Parameter acquisition submodule obtains the operational parameter for including in the visible SSID;
Algorithm acquisition submodule obtains the default transfer algorithm in the presetting database;
Wherein, the presetting database only includes a kind of default transfer algorithm;
The default transfer algorithm are as follows:
Enciphered method is replaced, or, evolution method;
Or;
Parameter algorithm acquisition submodule, for obtaining the operational parameter for including in the visible SSID and algorithm mark;
Algorithm searches submodule, for finding corresponding default conversion in the presetting database according to algorithm mark
Algorithm;
It wherein, include at least one default transfer algorithm in the presetting database;
Default transfer algorithm in the presetting database includes following at least one:
Replace enciphered method, evolution method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610909004.0A CN106572465B (en) | 2016-10-18 | 2016-10-18 | A kind of wireless connection method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610909004.0A CN106572465B (en) | 2016-10-18 | 2016-10-18 | A kind of wireless connection method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106572465A CN106572465A (en) | 2017-04-19 |
CN106572465B true CN106572465B (en) | 2019-07-30 |
Family
ID=58533801
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610909004.0A Active CN106572465B (en) | 2016-10-18 | 2016-10-18 | A kind of wireless connection method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106572465B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107182053B (en) * | 2017-06-08 | 2019-06-07 | 上海掌门科技有限公司 | It is a kind of for connecting the method and apparatus of hiding wireless access point |
WO2019037190A1 (en) | 2017-08-23 | 2019-02-28 | 华为技术有限公司 | Wi-fi hotspot connection method and terminal |
CN108260107A (en) * | 2018-01-10 | 2018-07-06 | 广州二元科技有限公司 | A kind of bicycle built-in device unlocking method based on Wi-Fi |
CN111368272B (en) * | 2020-03-16 | 2021-07-20 | 珠海格力电器股份有限公司 | Space monitoring management system, method, storage medium and computer equipment |
GB2605149B (en) * | 2021-03-23 | 2023-09-06 | British Telecomm | Method of operating a network |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104113934A (en) * | 2014-07-25 | 2014-10-22 | 北京奇虎科技有限公司 | Router accessing method for communication equipment and accessing system |
CN104488303A (en) * | 2014-04-16 | 2015-04-01 | 华为终端有限公司 | Device and method for accessing to wireless network |
CN104717296A (en) * | 2015-03-25 | 2015-06-17 | 阳海龙 | Social contact interactive method, device, terminal and system |
CN104936181A (en) * | 2015-06-25 | 2015-09-23 | 杭州华三通信技术有限公司 | Access authentication method and device for connecting specified AP (Access Point) |
CN105554746A (en) * | 2016-03-08 | 2016-05-04 | 叶茂森 | WIFI local area network communication system based on encryption SSID (Service Set Identifier) |
-
2016
- 2016-10-18 CN CN201610909004.0A patent/CN106572465B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104488303A (en) * | 2014-04-16 | 2015-04-01 | 华为终端有限公司 | Device and method for accessing to wireless network |
CN104113934A (en) * | 2014-07-25 | 2014-10-22 | 北京奇虎科技有限公司 | Router accessing method for communication equipment and accessing system |
CN104717296A (en) * | 2015-03-25 | 2015-06-17 | 阳海龙 | Social contact interactive method, device, terminal and system |
CN104936181A (en) * | 2015-06-25 | 2015-09-23 | 杭州华三通信技术有限公司 | Access authentication method and device for connecting specified AP (Access Point) |
CN105554746A (en) * | 2016-03-08 | 2016-05-04 | 叶茂森 | WIFI local area network communication system based on encryption SSID (Service Set Identifier) |
Also Published As
Publication number | Publication date |
---|---|
CN106572465A (en) | 2017-04-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106572465B (en) | A kind of wireless connection method and system | |
CN104836787B (en) | System and method for Authentication Client website | |
JP6668407B2 (en) | Terminal authentication method and apparatus used in mobile communication system | |
CN109417701A (en) | The method and apparatus of SIM profile is obtained for accessing cellular network | |
CN1310476C (en) | Method for building session connection to wireless local network user | |
US8332912B2 (en) | Method and apparatus for determining an authentication procedure | |
CN1685694B (en) | Session key management for public wireless lan supporitng multiple virtual operators | |
CN102318386B (en) | To the certification based on service of network | |
JP2006517359A (en) | Method and apparatus for providing network service information to a mobile station over a wireless local area network | |
CN104168561B (en) | Hot spot configuration method, cut-in method and equipment in a kind of WLAN | |
JP2007535240A (en) | Improved subscriber authentication for unlicensed mobile connection signaling | |
WO2017219673A1 (en) | Vowifi network access method and system, and terminal | |
CN106330445B (en) | Vehicle authentication method and device | |
CN101014958A (en) | System and method for managing user authentication and service authorization to achieve single-sign-on to access multiple network interfaces | |
CN104104516A (en) | Portal authentication method and device | |
CN107567017B (en) | Wireless connection system, device and method | |
WO2006097041A1 (en) | A general authentication former and a method for implementing the authentication | |
EP3930361A1 (en) | System and method for operating a user device with personalized identity module profiles | |
CN105450616B (en) | A kind of authentication method of terminal, accredited judgement gateway, certificate server and system | |
CN104869121B (en) | A kind of authentication method and device based on 802.1x | |
JP2017085226A (en) | Wireless access point | |
CN104469766A (en) | Terminal authentication method and device used in mobile communication system | |
CN113852959A (en) | Authentication method and device for Wi-Fi equipment by 5GC | |
CN105681268B (en) | Data transferring method and device | |
CN105208557B (en) | A kind of safety establishes the method and wireless router of WIFI connection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 201203 Pudong New Area, Shanghai, China (Shanghai) free trade pilot area 899 9, 1-4 1-4 story 01 rooms. Applicant after: Shanghai PeopleNet Security Technology Co., Ltd. Address before: 201821 211 rooms, No. 1411, Yecheng Road, Jiading District, Shanghai Applicant before: Shanghai PeopleNet Security Technology Co., Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |