CN106572465B - A kind of wireless connection method and system - Google Patents

A kind of wireless connection method and system Download PDF

Info

Publication number
CN106572465B
CN106572465B CN201610909004.0A CN201610909004A CN106572465B CN 106572465 B CN106572465 B CN 106572465B CN 201610909004 A CN201610909004 A CN 201610909004A CN 106572465 B CN106572465 B CN 106572465B
Authority
CN
China
Prior art keywords
ssid
wireless network
wireless
encryption
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610909004.0A
Other languages
Chinese (zh)
Other versions
CN106572465A (en
Inventor
谈剑锋
王齐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Peoplenet Security Technology Co Ltd
Original Assignee
Shanghai Peoplenet Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Peoplenet Security Technology Co Ltd filed Critical Shanghai Peoplenet Security Technology Co Ltd
Priority to CN201610909004.0A priority Critical patent/CN106572465B/en
Publication of CN106572465A publication Critical patent/CN106572465A/en
Application granted granted Critical
Publication of CN106572465B publication Critical patent/CN106572465B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption

Abstract

The invention discloses a kind of wireless connection method and systems, comprising: step S100 scans to obtain the non-encrypted wireless network of visible SSID;Step S300 obtains the hiding SSID of encryption wireless network according to the visible SSID;Step S400 sends connectivity request message to the corresponding wireless router of the encryption wireless network by the hiding SSID;Step S500 is successfully accessed the encryption wireless network when the request for receiving wireless router feedback passes through information.A kind of wireless connection method of the invention and system can provide the service of differentiation to ordinary user and VIP user, allow VIP user to obtain better any wireless network services, substantially increase the usage experience and satisfaction of VIP user.

Description

A kind of wireless connection method and system
Technical field
The present invention relates to wireless communication field more particularly to a kind of wireless connection method and systems.
Background technique
With the development of science and technology, the equipment such as mobile phone, tablet computer, laptop have become we live in it is indispensable Few article, in order to there is better experience, they are owned by wireless connecting function, they can pass through Wi-Fi (Wireless-Fidelity, Wireless Fidelity) accesses wireless network, so as to carry out internet communication.
Many non-encrypted wireless networks are had in present public arena, primarily to improve service quality, therefore, this A little non-encrypted wireless networks are generally provided by each businessman, market.It is connected into wireless network in order to facilitate the wireless terminal of client, this The SSID (Service Set Identifier, service set) of a little non-encrypted wireless networks is visible, this is just meaned Businessman is that all clients provide is all identical service, differentiated service can not be provided according to different customers;And this The non-encrypted wireless network of kind is generally used WEB authentication mode, and client oneself is needed to connect manually, and step is cumbersome.
Summary of the invention
The object of the present invention is to provide a kind of wireless connection method and systems, realize and provide difference to different types of user The service of change, to improve the purpose of user experience.
Technical solution provided by the invention is as follows:
A kind of wireless connection method, comprising: step S100 scans to obtain the non-encrypted wireless network of visible SSID;Step S300 obtains the hiding SSID of encryption wireless network according to the visible SSID;Step S400 passes through the hiding SSID to institute It states the corresponding wireless router of encryption wireless network and sends connectivity request message;Step S500, which works as, receives wireless router feedback Request when passing through information, be successfully accessed the encryption wireless network.
User gradation is divided into ordinary user and VIP user (it is also understood that nonregistered user and registration user), is Ordinary user and VIP user provide different any wireless network services, to achieve the purpose that promote VIP user experience.Having During body, wireless router provides a non-encrypted wireless network and encryption wireless network simultaneously, non-encrypted wireless network SSID is visible, and is facilitated all users to connect and is used (including: ordinary user and VIP user), and encrypts wireless network SSID is hiding, it is meant that not all people can access this encryption wireless network, ensure that the use of VIP user Permission.The hiding SSID of the visible SSID of non-encrypted wireless network and encryption wireless network has corresponding relationship, can be according to can See SSID, obtain hiding SSID, convenient for subsequent VIP user by encrypting wireless network in wireless terminal connection, obtains excellentization Service.
Further, the step S300 includes: step S310 according to the visible SSID and presetting database, is obtained corresponding Default transformation rule;Wherein, the default transformation rule includes: operational parameter and default transfer algorithm;Step S320 according to The visible SSID, the default transformation rule obtain the hiding SSID of the encryption wireless network.
It can be seen that SSID and hiding SSID has corresponding relationship, it can be understood as, hiding SSID is to after visible SSID encryption Form allow VIP user to be connected into encryption wireless network by default transfer algorithm and the available hiding SSID of operational parameter. This default transformation rule guarantees that hiding SSID has certain encryption, reduces all users and cracks to obtain and hides SSID's It may.
Further, the step S310 includes: that step S311 obtains the operational parameter for including in the visible SSID;Step S312 obtains the default transfer algorithm in the presetting database;Wherein, the presetting database only includes described in one kind Default transfer algorithm;The default transfer algorithm are as follows: replacement enciphered method, or, evolution method.
Operational parameter may be embodied in visible SSID, and default transfer algorithm can be stored in advance in presetting database In, it because can only be stored with a kind of default transfer algorithm, and include that operational parameter in visible SSID also only exists a kind of feelings Therefore condition can only obtain a hiding SSID, guarantee the feasibility for being correctly connected into encryption wireless network.
Further, the step S310 includes: that step S313 obtains the operational parameter for including and calculation in the visible SSID Method mark;Step S314 finds corresponding default transfer algorithm according to algorithm mark in the presetting database;Its In, it include at least one default transfer algorithm in the presetting database;Default conversion in the presetting database is calculated Method includes following at least one: replacement enciphered method, evolution method.
When there are many when default transfer algorithm for storage simultaneously in presetting database, it is seen that can not only join comprising operation in SSID Number can also be identified comprising algorithm, found corresponding default transfer algorithm in the preset database using algorithm mark, obtained hidden Hide SSID.The storage of a variety of default transfer algorithms further ensures hiding SSID and is not easy to be cracked, to ensure that offer is poor The possibility of alienation any wireless network services.
Further, between the step S100 and the step S300 further include: step S200 judges whether to have access to The non-encrypted wireless network, if it is not, not having the qualification of connection encryption wireless network then, is stood if so, thening follow the steps S300 Terminate to be wirelessly connected.
Before carrying out that hiding SSID is calculated, the identity of wireless terminal is also further judged, if wireless terminal connects Non-encrypted wireless network can not all connect, then it just less qualified can even encrypt wireless network, the setting resistance of this step The possibility that certain wireless terminals in blacklist are connected into encryption wireless network has been blocked, ensure that the safety of encryption wireless network Property.
Further, the step S200 includes: step S210 to the corresponding wireless router of the non-encrypted wireless network Send certification request information;Wherein, the certification request information includes: MAC Address;Step S220 is in when the MAC Address When white list, then the authentication pass information of wireless router transmission is received, and accesses the non-encrypted wireless network, and execute step Rapid S300;When the MAC Address is not in white list, the certification refusal information of wireless router transmission is received, then is not had There is the qualification of connection encryption wireless network, is immediately finished wireless connection.
Specifically judging whether wireless terminal can be connected into non-encrypted wireless network, is being to make wireless router judgement current wireless Whether the MAC Address of terminal is in blacklist, if it does, then wireless terminal will not be allowed to be connected into non-encrypted wireless network, More this wireless terminal cannot be allowed to be connected into encryption wireless network;And if the MAC Address of wireless terminal is not in blacklist, just Wireless terminal can be allowed successfully to be connected into non-encrypted wireless network, encryption wireless network subsequent can be connected into for wireless terminal and provide base Plinth.
Further, the step S500 includes: step S510 by wireless router, and the connectivity request message is sent To cloud authentication server;Step S520 is when connection request letter preset on the connectivity request message and cloud authentication server When ceasing consistent, then cloud authentication server is received by the request that wireless router is fed back and passes through information;Step S530 is when reception When passing through information to the request fed back by the wireless router, it is successfully accessed the encryption wireless network.
When wireless terminal is connected into encryption wireless network, EAP (Extensible Authentication is generally used Protocol, extensible authentication protocol) authentication mode, it needs just complete by the help of cloud authentication server whole A verification process provides safer flexible authentication function;And the introducing of cloud authentication server also facilitates and VIP is used The specific management at family, guarantee allow VIP user to enjoy quality services.
The present invention also provides a kind of wireless connection systems, comprising: wireless terminal, wireless router;The wireless terminal packet Include: scanning element obtains the non-encrypted wireless network of visible SSID for scanning;Acquiring unit is electrically connected with the scanning element It connects, the acquiring unit obtains the hiding SSID of encryption wireless network according to the visible SSID;Transmission unit is obtained with described Unit is taken to be electrically connected, the transmission unit is sent out by the hiding SSID to the corresponding wireless router of the encryption wireless network Send connectivity request message;Receiving unit, the request for receiving the wireless router feedback pass through information;Access unit, with The receiving unit electrical connection, the access unit access the encryption wireless network;The wireless router includes: feedback Member passes through information for feeding back the request.
After scanning obtains the non-encrypted wireless network of visible SSID, corresponding hide can be obtained according to visible SSID SSID obtains registration user to realize the purpose for hiding the corresponding encryption wireless network of SSID in wireless terminal connection To the network legal power of encryption wireless network, the usage experience of registration user is substantially increased.
Further, the acquiring unit specifically includes: rule acquisition module, for according to the visible SSID and present count According to library, obtain presetting transformation rule accordingly;Wherein, the default transformation rule includes: operational parameter and default transfer algorithm; SSID obtains module, is electrically connected with the rule acquisition module, is used for according to the visible SSID, the default transformation rule, Obtain the hiding SSID of the encryption wireless network;The rule acquisition module specifically includes: parameter acquisition submodule, obtains institute State the operational parameter for including in visible SSID;Algorithm acquisition submodule obtains the default transfer algorithm in the presetting database; Wherein, the presetting database only includes a kind of default transfer algorithm;The default transfer algorithm are as follows: replacement enciphered method, Or, evolution method.
Hiding SSID is to be obtained according to visible SSID and default transformation rule, and operational parameter and default transfer algorithm are Necessary factor, when presetting database is only stored with a kind of default transfer algorithm, it is seen that SSID can only include operational parameter, this Phase is calculated according to unique a kind of default transfer algorithm in the operational parameter and presetting database for including in visible SSID in sample The hiding SSID answered, to carry out subsequent being connected to the corresponding encryption wireless network of hiding SSID.
Further, the acquiring unit specifically includes: rule acquisition module, for according to the visible SSID and present count According to library, obtain presetting transformation rule accordingly;Wherein, the default transformation rule includes: operational parameter and default transfer algorithm; SSID obtains module, is electrically connected with the rule acquisition module, is used for according to the visible SSID, the default transformation rule, Obtain the hiding SSID of the encryption wireless network;The rule acquisition module specifically includes: parameter algorithm acquisition submodule, uses The operational parameter and algorithm mark for including in the acquisition visible SSID;Algorithm searches submodule, for according to the algorithm Mark finds corresponding default transfer algorithm in the presetting database;It wherein, include at least in the presetting database A kind of default transfer algorithm;Default transfer algorithm in the presetting database includes following at least one: replacement encryption Method, evolution method.
Can store that there are many default transfer algorithms in presetting database simultaneously, and specifically using which kind of preset transfer algorithm come Cooperation operational parameter and visible SSID obtain hiding SSID, are determined based on including the algorithm mark in visible SSID; Storage ensure that default transfer algorithm will not be cracked easily there are many default transfer algorithm in presetting database, and visible Both operational parameter is contained in SSID, also contains algorithm mark, certain interference effect is also played to cracker, allows hard solution Person quickly positions calculations parameter and algorithm mark, various considerations can not ensure that the safety of hiding SSID, further protect The corresponding encryption wireless network of hiding SSID has been demonstrate,proved to be not easy to be easily found;And when being connected into encryption wireless network, it can pass through EAP authentication, this authentication mode have more flexibility, reliability, substantially increase the usage experience of user.
Compared with prior art, the beneficial effects of the present invention are:
A kind of wireless connection method of the invention and system can provide the clothes of differentiation to ordinary user and VIP user Business, allows VIP user to obtain better any wireless network services, substantially increases the usage experience and satisfaction of VIP user.
Detailed description of the invention
Below by clearly understandable mode, preferred embodiment is described with reference to the drawings, to a kind of wireless connection method and Above-mentioned characteristic, technical characteristic, advantage and its implementation of system are further described.
Fig. 1 is the flow chart of wireless connection method one embodiment of the present invention;
Fig. 2 is the flow chart of another embodiment of wireless connection method of the present invention;
Fig. 3 is the flow chart of Fig. 2 step S310 one embodiment;
Fig. 4 is the structural schematic diagram of wireless connection system one embodiment of the present invention;
Fig. 5 is the structural schematic diagram of another embodiment of wireless connection system of the present invention;
Fig. 6 is the structural schematic diagram of another embodiment of wireless connection system of the present invention.
Drawing reference numeral explanation:
1000. wireless terminals, 1100. scanning elements, 1200. acquiring units, 1210. rule acquisition modules, 1211. parameters Acquisition submodule, 1212. algorithm acquisition submodules, 1213. parameter algorithm acquisition submodules, 1214. algorithms search submodule, 1220.SSID acquisition module, 1300. transmission units, 1400. receiving units, 1500. access units, 2000. wireless routers, 2100. feedback unit.
Specific embodiment
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, Detailed description of the invention will be compareed below A specific embodiment of the invention.It should be evident that drawings in the following description are only some embodiments of the invention, for For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing, and obtain other embodiments.
To make simplified form, part related to the present invention is only schematically shown in each figure, they are not represented Its practical structures as product.In addition, there is identical structure or function in some figures so that simplified form is easy to understand Component only symbolically depicts one of those, or has only marked one of those.Herein, "one" is not only indicated " only this ", can also indicate the situation of " more than one ".
In one embodiment of the invention, as shown in Figure 1, a kind of wireless connection method, comprising: step S100 is scanned To the non-encrypted wireless network of visible SSID;Step S300 obtains hiding for encryption wireless network according to the visible SSID SSID;Step S400 sends connection request letter to the corresponding wireless router of the encryption wireless network by the hiding SSID Breath;Step S500 is successfully accessed the encryption wireless network when the request for receiving wireless router feedback passes through information.
Specifically, providing a non-encrypted wireless network in wireless router, SSID is visible and another adds Close wireless network, SSID be it is hiding, so that wireless terminal is connected wireless router by two different modes.Purpose It is one wireless network of external embodiment, but can supports different wireless terminal users (ordinary user and VIP user, Huo Zheli Xie Wei, nonregistered user and registration user) using different modes connect wireless router.Since two class users are using different Authentication mode and security level, wireless router can provide the service of differentiation to different types of user.Such as: it is non-registered User can only access limited website and service, and the available complete internet access permission of registration user or internal services are visited Ask permission.
Whether the mode for distinguishing nonregistered user and registration user can be corresponding wireless by judging to have on wireless terminal It is connected to the network application program, if any, then illustrate that the user of contemporary wireless terminals for registration user, can attempt to obtain hidden Hide SSID.
The visible SSID of non-encrypted wireless network and the hiding SSID of encryption wireless network have corresponding relationship, therefore, root The hiding SSID of encryption wireless network is obtained according to visible SSID.When wireless terminal is wanted to be connected into encryption wireless network, need to pass through Relevant certification, such as: EAP authentication (EAP protocol), EAP are an authentication frameworks, are not a special authentication mechanisms.EAP Agreement is the core of IEEE802.1x authentication mechanism, it will realize that details transfers to attached EAP Method agreement to complete, and is based on The certification of EAP protocol is chiefly used in corporate authentication, relative to PSK mode, can provide safer flexible authentication function.Only exist The request of wireless router feedback is received when passing through information, wireless terminal could successfully be connected into encryption wireless network, carry out The operation of net.
Preferably, the step S300 includes: step S310 according to the visible SSID and presetting database, is obtained corresponding Default transformation rule;Wherein, the default transformation rule includes: operational parameter and the default transfer algorithm;Step S320 According to the visible SSID, the default transformation rule, the hiding SSID of the encryption wireless network is obtained.
Specifically, hiding SSID can obtain according to visible SSID and default transformation rule, this arrangement ensure that hiding Correspondence between SSID and visible SSID facilitates wireless terminal after scanning to non-encrypted wireless network, can quickly calculate The hiding SSID for encrypting wireless network accordingly is obtained, encryption wireless network can be connected into convenient for registration user, obtained good Service.
Preferably, the step S310 includes: that step S311 obtains the operational parameter for including in the visible SSID;Step S312 obtains the default transfer algorithm in the presetting database;Wherein, the presetting database only includes a kind of described default Transfer algorithm;The default transfer algorithm are as follows: replacement enciphered method, or, evolution method.
Specifically, may include operational parameter in visible SSID, and default transfer algorithm can store in presetting database In, it should be noted that in order to guarantee to obtain a corresponding hiding SSID according to a visible SSID, default transfer algorithm must It must be one kind, i.e., only save a kind of default transfer algorithm in presetting database, then cooperate operational parameter and visible SSID, obtain Corresponding hiding SSID is arrived.Default transfer algorithm can be selected voluntarily, such as: 1) enciphered method is replaced, is referred to, if visible SSID is ABC-1, and 1 is operational parameter, refers to that ABC respectively adds one to be replaced accordingly according to the definition of replacement enciphered method, then It obtains hiding SSID being BCD;And so on, if visible SSID is ABC-2, hiding SSID is CDE.2) evolution method, if It can be seen that SSID is ABC-1,1 is operational parameter, and the definition of evolution method can be displaced to last position for first, and 1 indicates this The move mode of sample is once to get being BCA to hiding SSID;If indicating mobile twice to get arriving it can be seen that SSID is ABC-2,2 Hiding SSID is CAB.It obtains hiding SSID using operational parameter and default transfer algorithm, ensure that hiding SSID is not easy to crack Property, it ensure that the safety of encryption wireless network.There are many kinds of default transfer algorithms, as long as guaranteeing according to operational parameter and can See that SSID obtains corresponding hiding SSID, herein, does not provide which kind of specifically presets transfer algorithm with.
Preferably, the step S310 includes: that step S313 obtains the operational parameter for including and calculation in the visible SSID Method mark;Step S314 finds corresponding default transfer algorithm according to algorithm mark in the presetting database;Its In, it include at least one default transfer algorithm in the presetting database;Default conversion in the presetting database is calculated Method includes following at least one: replacement enciphered method, evolution method.
Specifically, illustrating that there are many default conversions to calculate for storage in presetting database when identifying in visible SSID comprising algorithm Method is needed to be identified using this algorithm and finds corresponding default transfer algorithm, thus obtain hiding SSID, it is this in visible SSID Design simultaneously comprising algorithm mark and operational parameter, further ensure hiding SSID is not easy cracking.Such as: present count According to that can be stored with replacement enciphered method and evolution method in library simultaneously, when visible SSID is ABC-12,1 indicates algorithm mark, Corresponding is replacement enciphered method, and 2 are operational parameters, and therefore, available hiding SSID is CDE;When visible SSID is When ABC-22, first 2 expression algorithm mark, corresponding default transfer algorithm is evolution method, and second 2 is operation ginseng Number, therefore, available hiding SSID are CAB.
Preferably, between the step S100 and the step S300 further include: step S200 judges whether to connect Enter the non-encrypted wireless network, if so, S300 is thened follow the steps, if it is not, do not have the qualification of connection encryption wireless network then, It is immediately finished wireless connection.
Preferably, the step S200 includes: step S210 to the corresponding wireless router of the non-encrypted wireless network Send certification request information;Wherein, the certification request information includes: MAC Address;Step S220 is in when the MAC Address When white list, then the authentication pass information of wireless router transmission is received, and is connected into the non-encrypted wireless network, and execute step Rapid S300;When the MAC Address is not in white list, the certification refusal information of wireless router transmission is received, then is not had There is the qualification of connection encryption wireless network, is immediately finished wireless connection.
Specifically, this non-encrypted wireless network can be attached after the non-encrypted wireless network of visible SSID is arrived in scanning Network, in verification process can based on the authentication mode of WEB, such as: 1) open wireless terminal browser, input any network address; 2) webpage automatic jumps to certification page, and the input modes such as usemame/password or cell-phone number/identifying code are verified;3) it verifies After success, accessible internet.
It can also be sent to the MAC Address of wireless router, according to wireless terminal to judge whether wireless terminal is in Wireless terminal in blacklist is surfed the Internet if it is not, wireless terminal is then allowed successfully to be connected into non-encrypted wireless network;If If being, then wireless terminal is not eligible for being connected into all wireless networks of wireless router, including non-encrypted wireless network and plus Close wireless network.After wireless terminal can be connected into non-encrypted wireless network, in other words, encryption nothing is connected into when wireless terminal has When the qualification of gauze network, subsequent obtain hides SSID and sends connectivity request message etc., wireless network connection can be allowed to answer It is automatically performed with program, is manually performed without user, it is simple, convenient.
Preferably, the step S500 includes: step S510 by wireless router, and the connectivity request message is sent To cloud authentication server;Step S520 is when connection request letter preset on the connectivity request message and cloud authentication server When ceasing consistent, then cloud authentication server is received by the request that wireless router is fed back and passes through information;Step S530 is when reception When passing through information to the request fed back by the wireless router, it is successfully connected into the encryption wireless network.
Specifically, wireless terminal can hide the corresponding encryption wireless network of SSID to this when having obtained hiding SSID The corresponding wireless router of network sends connectivity request message, and the connectivity request message received is sent to cloud by wireless router Certificate server, when received connectivity request message is consistent with connectivity request message preset in cloud authentication server, cloud Certificate server is held to send request by information to wireless router, wireless router is again fed back to request undoubtedly by information Terminal allows wireless terminal to be successfully connected into encryption wireless network, and registration user is facilitated to carry out net operation.
In step S520 further include: when connection request preset on the connectivity request message and cloud authentication server is believed When ceasing inconsistent, then cloud authentication server is received by the request that wireless router is fed back and refuses information, cannot connect to institute State encryption wireless network.This illustrates that wireless terminal not over certification, therefore can not be connected into encryption wireless network, when this, Wireless terminal can only be connected into non-encrypted wireless network, obtain the network service of non-encrypted wireless network.
When wireless terminal is connected to encryption wireless network, it can be based on EAP authentication mode, this authentication mode needs cloud Server is supported.Each user is generally supported based on the authentication mode of EAP protocol using independent usemame/password or Certificate is authenticated, and can carry out finer management to each registration user in this way.
In another embodiment of the present invention, as shown in Figure 2 and Figure 3, a kind of wireless connection method, comprising: step S100 Scanning obtains the non-encrypted wireless network of visible SSID;Step S200 judges whether to have access to the non-encrypted wireless network, If so, thening follow the steps S300, if it is not, not having the qualification of connection encryption wireless network then, it is immediately finished wireless connection;It is described Step S200, which includes: step S210, sends certification request information to the corresponding wireless router of the non-encrypted wireless network;Its In, the certification request information includes: MAC Address;Step S220 is then received wireless when the MAC Address is in white list The authentication pass information that router is sent, and the non-encrypted wireless network is accessed, and execute step S300;As the MAC When location is not in white list, the certification refusal information of wireless router transmission is received, then does not have connection encryption wireless network Qualification, be immediately finished wireless connection;Step S300 obtains the hiding SSID of encryption wireless network according to the visible SSID; The step S300 includes: step S310 according to the visible SSID and presetting database, obtains presetting transformation rule accordingly; Wherein, the default transformation rule includes: operational parameter and the default transfer algorithm;The step S310 includes: step S311 obtains the operational parameter for including in the visible SSID;Step S312 obtains the calculation of the default conversion in the presetting database Method;Wherein, the presetting database only includes a kind of default transfer algorithm;The default transfer algorithm are as follows: replacement encryption Method, or, evolution method;Or, step S313 obtains the operational parameter for including in the visible SSID and algorithm mark;Step S314 finds corresponding default transfer algorithm according to algorithm mark in the presetting database;Wherein, described default It include at least one default transfer algorithm in database;Default transfer algorithm in the presetting database include it is following extremely Few one kind: replacement enciphered method, evolution method;Step S320 obtains institute according to the visible SSID, the default transformation rule State the hiding SSID of encryption wireless network;Step S400 is corresponding wireless to the encryption wireless network by the hiding SSID Router sends connectivity request message;Step S500 successfully connects when the request for receiving wireless router feedback passes through information Enter the encryption wireless network;The step S500 includes: step S510 by wireless router, by the connectivity request message It is sent to cloud authentication server;Step S520, which works as preset connection in the connectivity request message and cloud authentication server, to be asked When asking information consistent, then cloud authentication server is received by the request that wireless router is fed back and passes through information;Step S530 works as It receives when passing through information by the request that the wireless router is fed back, is successfully accessed the encryption wireless network.
Specifically, the present invention can allow different user to be connected into different wireless networks, to enjoy different network weights Limit makes businessman provide the service of differentiation to different users, substantially increases the satisfaction of registration user.
In another embodiment of the present invention, as shown in figure 4, a kind of wireless connection system, comprising: wireless terminal 1000, wireless router 2000;The wireless terminal 1000 includes: scanning element 1100, obtains visible SSID's for scanning Non-encrypted wireless network;Acquiring unit 1200 is electrically connected with the scanning element 1100, and the acquiring unit 1200 is according to described It can be seen that SSID, obtains the hiding SSID of encryption wireless network;Transmission unit 1300 is electrically connected, institute with the acquiring unit 1200 It states transmission unit 1300 and connection request is sent to the corresponding wireless router of the encryption wireless network by the hiding SSID Information;Receiving unit 1400, the request for receiving the wireless router feedback pass through information;Access unit 1500, with institute The electrical connection of receiving unit 1400 is stated, the access unit accesses the encryption wireless network;The wireless router 2000 includes: Feedback unit 2100 passes through information for feeding back the request.
Specifically, can be corresponded to according to visible SSID after scanning obtains the non-encrypted wireless network of visible SSID Hiding SSID, thus realize wireless terminal connection on hide SSID it is corresponding encryption wireless network purpose, make register user The network legal power of available encryption wireless network, substantially increases the usage experience of registration user.
In another embodiment of the present invention, as shown in figure 5, a kind of wireless connection system, wireless terminal 1000, wirelessly Router 2000;The wireless terminal 1000 includes: scanning element 1100, obtains the non-encrypted wireless of visible SSID for scanning Network;Acquiring unit 1200 is electrically connected with the scanning element 1100, the acquiring unit 1200 according to the visible SSID, Obtain the hiding SSID of encryption wireless network;The acquiring unit 1200 specifically includes: rule acquisition module 1210, is used for basis The visible SSID and presetting database obtain presetting transformation rule accordingly;Wherein, the default transformation rule includes: fortune Calculate parameter and default transfer algorithm;SSID obtains module 1220, is electrically connected with the rule acquisition module 1210, for according to institute Visible SSID, the default transformation rule are stated, the hiding SSID of the encryption wireless network is obtained;The rule acquisition module 1210 specifically include: parameter acquisition submodule 1211, obtain the operational parameter for including in the visible SSID;Algorithm obtains submodule Block 1212 obtains the default transfer algorithm in the presetting database;Wherein, the presetting database only includes a kind of described pre- If transfer algorithm;The default transfer algorithm are as follows: replacement enciphered method, or, evolution method;Transmission unit 1300 is obtained with described Unit 1200 is taken to be electrically connected, the transmission unit passes through the hiding SSID to the corresponding wireless routing of the encryption wireless network Device sends connectivity request message;Receiving unit 1400, the request for receiving the wireless router feedback pass through information;Access Unit 1500 is electrically connected with the receiving unit, and the access unit accesses the encryption wireless network;The wireless router 2000 include: feedback unit 2100, passes through information for feeding back the request.
Specifically, hiding SSID is to be obtained according to visible SSID and default transformation rule, and operational parameter turns with default Scaling method is necessary factor, when presetting database is only stored with a kind of default transfer algorithm, it is seen that SSID can be only comprising fortune Parameter is calculated, in this way according to unique a kind of default transfer algorithm in the operational parameter and presetting database for including in visible SSID, Hiding SSID accordingly is calculated, to carry out subsequent being connected to the corresponding encryption wireless network of hiding SSID.
In another embodiment of the present invention, as shown in fig. 6, a kind of wireless connection system, comprising: wireless terminal 1000, wireless router 2000;The wireless terminal 1000 includes: scanning element 1100, obtains visible SSID's for scanning Non-encrypted wireless network;Acquiring unit 1200 is electrically connected with the scanning element, and the acquiring unit is according to described visible SSID obtains the hiding SSID of encryption wireless network;The acquiring unit 1200 specifically includes: rule acquisition module 1210, uses According to the visible SSID and presetting database, obtaining presetting transformation rule accordingly;Wherein, the default transformation rule packet It includes: operational parameter and default transfer algorithm;SSID obtains module 1220, is electrically connected with the rule acquisition module, is used for basis The visible SSID, the default transformation rule obtain the hiding SSID of the encryption wireless network;The rule acquisition module 1210 specifically include: parameter algorithm acquisition submodule 1213, for obtaining the operational parameter for including in the visible SSID and calculation Method mark;Algorithm searches submodule 1214, corresponding for being found in the presetting database according to algorithm mark Default transfer algorithm;It wherein, include at least one default transfer algorithm in the presetting database;The presetting database In default transfer algorithm include following at least one: replacement enciphered method, evolution method;Transmission unit 1300 is obtained with described Unit is taken to be electrically connected, the transmission unit is sent out by the hiding SSID to the corresponding wireless router of the encryption wireless network Send connectivity request message;Receiving unit 1400, the request for receiving the wireless router feedback pass through information;Access unit 1500, it is electrically connected with the receiving unit, the access unit accesses the encryption wireless network;The wireless router 2000 Include: feedback unit 2100, passes through information for feeding back the request.
Specifically, can store simultaneously in presetting database, there are many default transfer algorithms, and specifically utilize which kind of default turn Scaling method cooperates the operational parameter and visible SSID to obtain hiding SSID, be based on include algorithm in visible SSID identify come Determining;Storage ensure that default transfer algorithm will not be cracked easily there are many default transfer algorithm in presetting database, and It can be seen that both containing operational parameter in SSID, algorithm mark is also contained, certain interference effect is also played to cracker, is allowed Hard solution person can not quickly positions calculations parameter and algorithm identify, and various considerations ensure that the safety of hiding SSID, into one Step ensure that the corresponding encryption wireless network of hiding SSID is not easy to be easily found;It, can be with and when being connected into encryption wireless network By EAP authentication, this authentication mode has more flexibility, reliability, substantially increases the usage experience of user.
It should be noted that above-described embodiment can be freely combined as needed.The above is only of the invention preferred Embodiment, it is noted that for those skilled in the art, in the premise for not departing from the principle of the invention Under, several improvements and modifications can also be made, these modifications and embellishments should also be considered as the scope of protection of the present invention.

Claims (5)

1. a kind of wireless connection method characterized by comprising
Step S100 scans to obtain the non-encrypted wireless network of visible SSID;
Step S300 judges whether there is corresponding wireless network connection application program, if so, then being obtained according to the visible SSID Encrypt the hiding SSID of wireless network;
Step S400 sends connection request letter to the corresponding wireless router of the encryption wireless network by the hiding SSID Breath;
Step S500 is successfully accessed the encryption wireless network when the request for receiving wireless router feedback passes through information;
Wherein, described to be specifically included according to the visible SSID, the hiding SSID for obtaining encryption wireless network:
Step S310 obtains presetting transformation rule accordingly according to the visible SSID and presetting database;Wherein, described default Transformation rule includes: operational parameter and default transfer algorithm;
Step S320 obtains the hiding SSID of the encryption wireless network according to the visible SSID, the default transformation rule;
The step S310 includes:
Step S311 obtains the operational parameter for including in the visible SSID;
Step S312 obtains the default transfer algorithm in the presetting database;
Wherein, the presetting database only includes a kind of default transfer algorithm;
The default conversion transfer algorithm are as follows: replacement enciphered method, or, place-exchange method;
Or;
Step S313 obtains the operational parameter for including in the visible SSID and algorithm mark;
Step S314 finds corresponding default transfer algorithm according to algorithm mark in the presetting database;
It wherein, include at least one default transfer algorithm in the presetting database;
Default transfer algorithm in the presetting database includes following at least one:
Replace enciphered method, evolution method.
2. wireless connection method as described in claim 1, characteristically between the step S100 and the step S300 Further include:
Step S200 judges whether to have access to the non-encrypted wireless network, if so, S300 is thened follow the steps, if it is not, then not Qualification with connection encryption wireless network, is immediately finished wireless connection.
3. wireless connection method as claimed in claim 2, which is characterized in that the step S200 includes:
Step S210 sends certification request information to the corresponding wireless router of the non-encrypted wireless network;
Wherein, the certification request information includes: MAC Address;
Step S220 then receives the authentication pass information of wireless router transmission when the MAC Address is in white list, and connects Enter the non-encrypted wireless network, and executes step S300;When the MAC Address is not in white list, no route is received Information is refused by the certification that device is sent, then does not have the qualification of connection encryption wireless network, is immediately finished wireless connection.
4. wireless connection method a method according to any one of claims 1-3, which is characterized in that the step S500 includes:
The connectivity request message is sent to cloud authentication server by wireless router by step S510;
Step S520 then connects when the connectivity request message is consistent with connectivity request message preset in cloud authentication server It receives cloud authentication server and information is passed through by the request that wireless router is fed back;
Step S530 when receive information is passed through by the request that the wireless router is fed back when, be successfully accessed it is described plus Close wireless network.
5. a kind of wireless connection system using the wireless connection method as described in claim 1-4 is any, which is characterized in that packet It includes:
Wireless terminal, wireless router;
The wireless terminal includes: scanning element, obtains the non-encrypted wireless network of visible SSID for scanning;
Judging unit, for judging whether there is corresponding wireless network connection application program;
Acquiring unit is electrically connected with the scanning element, and the acquiring unit is used to have corresponding wireless network connection when judgement When application program, according to the visible SSID, the hiding SSID of encryption wireless network is obtained;
Transmission unit is electrically connected with the acquiring unit, and the transmission unit is wireless to the encryption by the hiding SSID The corresponding wireless router of network sends connectivity request message;
Receiving unit, the request for receiving the wireless router feedback pass through information;
Access unit is electrically connected with the receiving unit, and the access unit accesses the encryption wireless network;
The wireless router includes:
Feedback unit passes through information for feeding back the request;
The acquiring unit specifically includes:
Rule acquisition module, for obtaining presetting transformation rule accordingly according to the visible SSID and presetting database;
Wherein, the default transformation rule includes: operational parameter and default transfer algorithm;
SSID obtains module, is electrically connected with the rule acquisition module, for being advised according to the visible SSID, the default conversion Then, the hiding SSID of the encryption wireless network is obtained;
The rule acquisition module specifically includes:
Parameter acquisition submodule obtains the operational parameter for including in the visible SSID;
Algorithm acquisition submodule obtains the default transfer algorithm in the presetting database;
Wherein, the presetting database only includes a kind of default transfer algorithm;
The default transfer algorithm are as follows:
Enciphered method is replaced, or, evolution method;
Or;
Parameter algorithm acquisition submodule, for obtaining the operational parameter for including in the visible SSID and algorithm mark;
Algorithm searches submodule, for finding corresponding default conversion in the presetting database according to algorithm mark Algorithm;
It wherein, include at least one default transfer algorithm in the presetting database;
Default transfer algorithm in the presetting database includes following at least one:
Replace enciphered method, evolution method.
CN201610909004.0A 2016-10-18 2016-10-18 A kind of wireless connection method and system Active CN106572465B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610909004.0A CN106572465B (en) 2016-10-18 2016-10-18 A kind of wireless connection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610909004.0A CN106572465B (en) 2016-10-18 2016-10-18 A kind of wireless connection method and system

Publications (2)

Publication Number Publication Date
CN106572465A CN106572465A (en) 2017-04-19
CN106572465B true CN106572465B (en) 2019-07-30

Family

ID=58533801

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610909004.0A Active CN106572465B (en) 2016-10-18 2016-10-18 A kind of wireless connection method and system

Country Status (1)

Country Link
CN (1) CN106572465B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107182053B (en) * 2017-06-08 2019-06-07 上海掌门科技有限公司 It is a kind of for connecting the method and apparatus of hiding wireless access point
WO2019037190A1 (en) 2017-08-23 2019-02-28 华为技术有限公司 Wi-fi hotspot connection method and terminal
CN108260107A (en) * 2018-01-10 2018-07-06 广州二元科技有限公司 A kind of bicycle built-in device unlocking method based on Wi-Fi
CN111368272B (en) * 2020-03-16 2021-07-20 珠海格力电器股份有限公司 Space monitoring management system, method, storage medium and computer equipment
GB2605149B (en) * 2021-03-23 2023-09-06 British Telecomm Method of operating a network

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104113934A (en) * 2014-07-25 2014-10-22 北京奇虎科技有限公司 Router accessing method for communication equipment and accessing system
CN104488303A (en) * 2014-04-16 2015-04-01 华为终端有限公司 Device and method for accessing to wireless network
CN104717296A (en) * 2015-03-25 2015-06-17 阳海龙 Social contact interactive method, device, terminal and system
CN104936181A (en) * 2015-06-25 2015-09-23 杭州华三通信技术有限公司 Access authentication method and device for connecting specified AP (Access Point)
CN105554746A (en) * 2016-03-08 2016-05-04 叶茂森 WIFI local area network communication system based on encryption SSID (Service Set Identifier)

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104488303A (en) * 2014-04-16 2015-04-01 华为终端有限公司 Device and method for accessing to wireless network
CN104113934A (en) * 2014-07-25 2014-10-22 北京奇虎科技有限公司 Router accessing method for communication equipment and accessing system
CN104717296A (en) * 2015-03-25 2015-06-17 阳海龙 Social contact interactive method, device, terminal and system
CN104936181A (en) * 2015-06-25 2015-09-23 杭州华三通信技术有限公司 Access authentication method and device for connecting specified AP (Access Point)
CN105554746A (en) * 2016-03-08 2016-05-04 叶茂森 WIFI local area network communication system based on encryption SSID (Service Set Identifier)

Also Published As

Publication number Publication date
CN106572465A (en) 2017-04-19

Similar Documents

Publication Publication Date Title
CN106572465B (en) A kind of wireless connection method and system
CN104836787B (en) System and method for Authentication Client website
JP6668407B2 (en) Terminal authentication method and apparatus used in mobile communication system
CN109417701A (en) The method and apparatus of SIM profile is obtained for accessing cellular network
CN1310476C (en) Method for building session connection to wireless local network user
US8332912B2 (en) Method and apparatus for determining an authentication procedure
CN1685694B (en) Session key management for public wireless lan supporitng multiple virtual operators
CN102318386B (en) To the certification based on service of network
JP2006517359A (en) Method and apparatus for providing network service information to a mobile station over a wireless local area network
CN104168561B (en) Hot spot configuration method, cut-in method and equipment in a kind of WLAN
JP2007535240A (en) Improved subscriber authentication for unlicensed mobile connection signaling
WO2017219673A1 (en) Vowifi network access method and system, and terminal
CN106330445B (en) Vehicle authentication method and device
CN101014958A (en) System and method for managing user authentication and service authorization to achieve single-sign-on to access multiple network interfaces
CN104104516A (en) Portal authentication method and device
CN107567017B (en) Wireless connection system, device and method
WO2006097041A1 (en) A general authentication former and a method for implementing the authentication
EP3930361A1 (en) System and method for operating a user device with personalized identity module profiles
CN105450616B (en) A kind of authentication method of terminal, accredited judgement gateway, certificate server and system
CN104869121B (en) A kind of authentication method and device based on 802.1x
JP2017085226A (en) Wireless access point
CN104469766A (en) Terminal authentication method and device used in mobile communication system
CN113852959A (en) Authentication method and device for Wi-Fi equipment by 5GC
CN105681268B (en) Data transferring method and device
CN105208557B (en) A kind of safety establishes the method and wireless router of WIFI connection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 201203 Pudong New Area, Shanghai, China (Shanghai) free trade pilot area 899 9, 1-4 1-4 story 01 rooms.

Applicant after: Shanghai PeopleNet Security Technology Co., Ltd.

Address before: 201821 211 rooms, No. 1411, Yecheng Road, Jiading District, Shanghai

Applicant before: Shanghai PeopleNet Security Technology Co., Ltd.

GR01 Patent grant
GR01 Patent grant