CN108521651B - Secondary authentication method of WiFi network - Google Patents

Secondary authentication method of WiFi network Download PDF

Info

Publication number
CN108521651B
CN108521651B CN201810278111.7A CN201810278111A CN108521651B CN 108521651 B CN108521651 B CN 108521651B CN 201810278111 A CN201810278111 A CN 201810278111A CN 108521651 B CN108521651 B CN 108521651B
Authority
CN
China
Prior art keywords
authentication
wireless
access point
information
wireless access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810278111.7A
Other languages
Chinese (zh)
Other versions
CN108521651A (en
Inventor
程翰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Shangxiang Network Technology Co ltd
Original Assignee
上海尚往网络科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海尚往网络科技有限公司 filed Critical 上海尚往网络科技有限公司
Priority to CN201810278111.7A priority Critical patent/CN108521651B/en
Publication of CN108521651A publication Critical patent/CN108521651A/en
Application granted granted Critical
Publication of CN108521651B publication Critical patent/CN108521651B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a secondary authentication method of a WiFi network, which comprises the steps of obtaining access information of a wireless access point scanned by a wireless device, wherein the access information comprises password information of two-layer authentication; establishing connection with one wireless access point of the scanned at least one wireless access point through two-layer authentication according to the acquired access information of the wireless access points; sending a three-layer authentication request to the network equipment; and after the three layers of authentication are successful, obtaining the network access authority. Establishing connection with a wireless access point through two-layer authentication, and encrypting data of a wireless link; network access authority is obtained through three-layer authentication so as to limit a specific user (authorized user) to use network resources, and the safety of the WiFi network is improved.

Description

Secondary authentication method of WiFi network
[ technical field ] A method for producing a semiconductor device
The application relates to the field of internet application, in particular to a secondary authentication method of a WiFi network.
[ background of the invention ]
Wireless security is an important component of WLAN systems, and since WiFi networks use open media, i.e. electromagnetic waves, as carriers to transmit data signals, the risk of data transmission is greatly increased if the transmission link is not protected by proper encryption. Therefore, in WLAN systems, wireless security is of particular importance. In order to enhance the security of the WiFi network, two security mechanisms, encryption and authentication, are mainly adopted.
In the prior art, encryption and authentication are performed when a wireless device establishes connection with a wireless access point, and the load on the wireless access point and a server is large; or when the wireless equipment establishes connection with the wireless access point, encryption is carried out, an authentication mechanism is lacked, and the safety is poor; or after the wireless device establishes connection with the wireless access point, authentication is performed, and the wireless link is an open link, so that packet capturing and analysis are easy to perform, and the security is poor.
[ summary of the invention ]
Aspects of the present application provide a secondary authentication method for a WiFi network, which is used to improve security of the WiFi network.
One aspect of the present application provides a secondary authentication method for a WiFi network, including: acquiring wireless access point information of a wireless access point scanned by wireless equipment, wherein the access information comprises password information of two-layer authentication; establishing connection with one wireless access point in the scanned at least one wireless access point through two-layer authentication according to the acquired wireless access point information; sending a three-layer authentication request to the network equipment; and after the three layers of authentication are successful, obtaining the network access authority.
In another aspect of the present application, a method for secondary authentication of a WiFi network is provided, including: acquiring an acquisition request sent by wireless equipment, wherein the acquisition request comprises identification information of a wireless access point; inquiring access information corresponding to the wireless access point, wherein the access information comprises password information of two-layer authentication; returning access information corresponding to the wireless access point to the wireless equipment so that the wireless equipment establishes connection with the wireless access point through two-layer authentication according to the acquired wireless access point information; and network access rights are obtained through three-layer authentication.
In another aspect of the present application, a method for secondary authentication of a WiFi network is provided, including: the wireless device performs two-layer authentication so that the wireless device establishes connection with the wireless access point; and receiving a three-layer authentication request sent by the wireless equipment, and performing three-layer authentication on the wireless equipment.
In another aspect of the present application, there is provided an apparatus, comprising: one or more processors; a storage device to store one or more programs that, when executed by the one or more processors, cause the one or more processors to implement any of the above-described methods.
In another aspect of the present application, a computer-readable storage medium is provided, on which a computer program is stored, wherein the program, when executed by a processor, implements any of the above-mentioned methods.
According to the technical scheme, the embodiment of the application can establish connection with the wireless access point through two-layer authentication and encrypt data of a wireless link; network access authority is obtained through three-layer authentication so as to limit a specific user (authorized user) to use network resources, and the safety of the WiFi network is improved.
[ description of the drawings ]
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and those skilled in the art can also obtain other drawings according to the drawings without inventive labor.
Fig. 1 is a schematic flowchart of a secondary authentication method for a WiFi network according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of a secondary authentication method for a WiFi network according to a second embodiment of the present application;
fig. 3 is a schematic flowchart of a secondary authentication method for a WiFi network according to a third embodiment of the present application;
FIG. 4 is a block diagram of an exemplary computer system/server suitable for use in implementing embodiments of the present invention.
[ detailed description ] embodiments
To make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in some embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In addition, the term "and/or" herein is only one kind of association relationship describing an associated object, and means that there may be three kinds of relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
Fig. 1 is a schematic flowchart of a secondary authentication method for a WiFi network according to an embodiment of the present application, as shown in fig. 1, including the following steps:
step S11, acquiring wireless access point information of the wireless access point scanned by the wireless device, wherein the access information comprises password information of the two-layer authentication;
step S12, according to the acquired wireless access point information, establishing connection with one of the scanned at least one wireless access point through two-layer authentication;
step S13, sending a three-layer authentication request to the network equipment; the network equipment comprises an authentication server and a wireless access point; and after the three layers of authentication are successful, network access can be carried out through the wireless access point.
The execution subject of the method shown in fig. 1 may be a client installed in a wireless device; such as Applications (APPs) installed on wireless devices, etc.
The wireless device includes, but is not limited to, any intelligent terminal device that can perform human-computer interaction with a user and can implement a wireless communication function, such as a smart phone, a tablet computer, a notebook computer, and the like. The intelligent terminal device can adopt any operating system, such as an Android operating system, an iOS operating system, a Windows operating system and the like.
The wireless access point may be an AP, a terminal device hotspot, etc., that provides wireless network access services. The wireless network includes, but is not limited to, a wireless local area network based on IEEE802.11 series standard protocols, for example, a wireless local area network based on IEEE802.11n protocol and IEEE802.11ac protocol, which is known as a WiFi network, and a wireless device can access the corresponding wireless network through the wireless access point. In the following embodiments of the present invention, a wireless access point accessing a WiFi network is taken as an example for description. In the following embodiments of the present application, the wireless access point and the wireless hotspot, the WiFi hotspot, and the hotspot may be used interchangeably.
In one preferred implementation of step S11,
preferably, the following sub-steps are included:
substep S111, the client installed by the wireless equipment acquires the identification information of the wireless access point scanned by the wireless equipment to establish a wireless access point scanning list;
step S112, the client installed in the wireless device sends an acquisition request to the access server to acquire the access information of the wireless access point returned by the access server; or searching the scanned access information corresponding to the wireless access point from the statistical information of the wireless access point acquired from the server in advance.
In a preferred implementation of sub-step S111,
the wireless access point scanning list is established by the wireless device scanning the wireless access points nearby the wireless device according to the identification information of the scanned wireless access points.
The identification information is SSID (Service Set Identifier) information of the wireless access point, and is used for identifying a wireless network corresponding to the wireless access point. The wireless access point encapsulates the SSID (Service Set Identifier) information thereof in the non-encrypted part of the data packet, and broadcasts the SSID information in a broadcast manner.
The method comprises the steps that a WiFi module of the wireless equipment scans wireless access points nearby the wireless equipment, SSID (Service Set Identifier) information of the one or more wireless access points is obtained based on the one or more scanned wireless access points, the SSID information of the one or more wireless access points is sent to a client of the wireless equipment, and a scanning list is established by the client.
Further, the SSID information may be further refined into BSSID (Basic Service Set Identifier) new information and ESSID (Extended Service Set Identifier) information, where the BSSID information is used to identify a smaller BSS area, each host communicates in the smaller area, and the ESSID information is applied to a larger-scale and more complex wireless network, where different BSSs may be Extended to corresponding ESS (Extended Service Set, multiple base station systems). In the subsequent embodiments of the present invention, the MAC (Media Access Control) of the wireless Access point is used as BSSID information of the wireless Access point.
Preferably, the identification information is SSID information and BSSID information of the wireless access point.
Preferably, the WiFi module of the wireless device scans wireless access points near the wireless device, obtains scanning information of the one or more wireless access points, such as encryption type (WEP, WAP-PSK, WPA2-PSK), whether config has been created (i.e. whether the wireless device is connected to the wireless access point), signal strength, and the like, and sends the scanning information of the one or more wireless access points to the client of the wireless device for storage.
In a preferred implementation of sub-step S112,
the client installed in the wireless equipment sends an acquisition request to the access server to acquire the access information of the wireless access point returned by the access server.
The acquisition request includes identification information of the wireless access point. Preferably, the acquisition request includes a scan list established according to the identification information of the wireless access point scanned by the wireless device.
The acquisition request requests to acquire the access information of the wireless access points in the scanning list from an access server.
In this embodiment, a data network of a wireless device is available, and the wireless device completes sending of the acquisition request based on a currently existing data network, for example, completes sending of the acquisition request based on an already opened mobile communication network, such as a 3G network, a 4G network, and the like; for another example, the sending of the acquisition request is completed based on an already turned on wireless local area network, such as a WiFi network.
And the client installed on the wireless equipment acquires the access information of the wireless access point returned by the access server and stores the access information on the wireless equipment.
The access server searches and determines the access information of the corresponding wireless access point based on the SSID information and BSSID information of the wireless access point. Specifically, the access server stores a large amount of wireless access points and access information corresponding to the wireless access points. Each wireless access point stored in the access server is uniquely determined by its corresponding SSID information and BSSID information.
The access information comprises an authentication mode and password information of the wireless access point. The authentication mode of the wireless access point comprises the following steps: whether the authentication modes of secondary authentication, two-layer authentication and three-layer authentication in the secondary authentication are adopted or not; wherein the two-tier authentication comprises: open system authentication, PSK authentication, 802.1x authentication, WPS authentication and CA certificate authentication; the three-layer authentication comprises: portal authentication. The password information is password information of two-layer authentication and authentication information of three-layer authentication, wherein the password information of the two-layer authentication comprises a static secret key of PSK access authentication, a user name and a password of 802.1x access authentication, a PIN of WPS access authentication, a CA certificate of CAN certificate authentication and the like; the authentication information of the three-layer authentication comprises a user name and a password of Portal authentication.
In this embodiment, the two-layer authentication is an admission authentication method completed on the data link layer, and the three-layer authentication is an authentication completed on the IP layer. The two-layer authentication is the authentication which the user must pass before obtaining the three-layer IP address, when the user accesses the network, the user needs to carry out the interaction of authentication data with the network side through the two-layer connection, and the user can apply for the IP address from the DHCP server only if the user successfully passes the authentication, thereby receiving and transmitting the data. A representative implementation of two-layer authentication is 802.1X. The three-layer authentication is also called Web authentication, and the authentication process is completed through a Web page.
Preferably, the access information of the wireless access point is obtained by an access server sending an access information query request to the wireless access point. And the access server sends an access information query request to the wireless access points in the scanning list according to the scanning list included in the acquisition request, and acquires the access information returned by the wireless access points according to the access information query request.
Preferably, the access information of the wireless access point is obtained by an access server querying an access information database periodically received from the wireless access point. The wireless access point reports the access information to the access server periodically, or reports the access information system to the access server when the configuration of the access information is changed. And the access server stores the access information into an access information database according to the identification information of the wireless access point. When an access server receives an acquisition request sent by wireless equipment, the access server inquires an access information database according to the identification information of the wireless access point in the acquisition request to obtain the access information of the wireless access point.
Wherein the acquisition request includes identification information of the wireless access point; the access information comprises an authentication mode and password information of the wireless access point.
In another preferred implementation of sub-step S112,
and the wireless equipment searches the access information corresponding to the scanned wireless access point from the statistical information of the wireless access point acquired from the server in advance according to the identification information of the scanned wireless access point.
In many application scenarios, the wireless device cannot establish a network connection, e.g., no network, which means that the wireless device cannot acquire access information of the wireless access point from the network device.
The wireless device acquires the access information of the wireless access point from the server in advance and stores the access information locally in the wireless device. Each wireless access point stored locally by the wireless device is uniquely identified by its corresponding identification. Preferably, the wireless device looks up and determines access information of the corresponding wireless access point based on SSID information and BSSID information of the wireless access point.
The access information comprises an authentication mode and password information of the wireless access point. The authentication mode of the wireless access point comprises the following steps: whether the authentication modes of secondary authentication, two-layer authentication and three-layer authentication in the secondary authentication are adopted or not; wherein the two-tier authentication comprises: open system authentication, PSK authentication, 802.1x authentication, WPS authentication and CA certificate authentication; the three-layer authentication comprises: portal authentication. The password information is password information of two-layer authentication and authentication information of three-layer authentication, wherein the password information of the two-layer authentication comprises a static secret key of PSK access authentication, a user name and a password of 802.1x access authentication, a PIN of WPS access authentication and a CA certificate of CAN certificate authentication.
In this embodiment, when the data network of the wireless device is available, the wireless device obtains the access information of the wireless access point from the server based on the available data network and stores the access information locally in the wireless device, for example, based on the turned-on mobile communication network, such as a 3G network, a 4G network, etc.; as another example, based on a wireless local area network that is already turned on, such as a WiFi network.
Preferably, the client of the wireless device obtains the access information of the wireless access point from the server in advance based on the available data network at the time of first networking, or at a timing, or according to a user instruction.
Preferably, the access information of the wireless access point is obtained by an access server querying an access information database periodically received from the wireless access point. The wireless access point reports the access information to the access server periodically, or reports the access information system to the access server when the configuration of the access information is changed. And the access server stores the access information into an access information database according to the identification information of the wireless access point. When an access server receives an acquisition request sent by wireless equipment, the access server inquires an access information database according to the identification information of the wireless access point in the acquisition request to obtain the access information of the wireless access point.
In one preferred implementation of step S12,
preferably, the client installed in the wireless device establishes a wireless connection with the wireless access point through two-layer authentication based on the access information of the wireless access point.
Preferably, the following sub-steps are included:
substep S121, displaying accessible prompt information of the wireless access point, which acquires the access information from the server, on the wireless access point list;
and a substep S122, the client installed in the wireless device establishes a wireless connection with the corresponding wireless access point through two-layer authentication by using the access information of the wireless access point selected by the user from the wireless access point list.
In a preferred implementation of sub-step S121,
preferably, the accessible prompt information of the wireless access point is displayed on the wireless access point list of the client. The grading result can be represented by a certain graphic identifier, and the security of the wireless access point adopting the secondary authentication is higher, so that the security of the wireless access point can be conveniently and visually judged by a user by the color of the graphic identifier, for example, the secondary authentication adopted by the wireless access point is represented by green, the security is higher, the secondary authentication not adopted by the wireless access point is represented by red, and the security is lower; thereby facilitating the user to further select the wireless access point for access.
Preferably, the client of the wireless device interacts with the WiFi module of the wireless device, and displays the accessible prompt information of the wireless access point on the system native wireless access point list of the wireless device. The grading result can be represented by a certain graphic identifier, and the security of the wireless access point adopting the secondary authentication is higher, so that the security of the wireless access point can be conveniently and visually judged by a user by the color of the graphic identifier, for example, the secondary authentication adopted by the wireless access point is represented by green, the security is higher, the secondary authentication not adopted by the wireless access point is represented by red, and the security is lower; thereby facilitating the user to further select the wireless access point for access.
In a preferred implementation of sub-step S122,
wherein the two-tier authentication comprises: open system authentication, PSK authentication, 802.1x authentication and WPS authentication; the three-layer authentication comprises: portal authentication. The password information is two-layer authentication password information and three-layer authentication information, wherein the two-layer authentication password information comprises a static key of PSK access authentication, a user name and a password of 802.1x access authentication and a PIN of WPS access authentication.
Preferably, the user selects a wireless access point required by the user from a plurality of wireless access points presented on a wireless access point list of a client of the wireless device, or selects a wireless access point required by the user from a plurality of wireless access points presented on a system-native wireless access point list of the wireless device. The wireless device establishes a wireless connection with the wireless access point, for example, by clicking on an establish connection button.
The establishment of the wireless connection can be that the client terminal automatically initiates a connection request to the wireless access point based on the password information of the two-layer authentication of the wireless access point, and the whole connection process automatically runs in the background;
the establishment of the wireless connection may be that password information of the two-layer authentication of the wireless access point is presented to a user corresponding to the wireless device, for example, the password information of the two-layer authentication is sent to the client in an in-application prompt message manner, and then the user performs the wireless connection based on the acquired password information, for example, the user selects a manner of manually inputting the password information to send a connection request to the wireless access point.
For the wireless access point with the two-layer authentication mode of open system authentication, the wireless device can directly access the wireless access point.
For the wireless access point with the two-layer authentication mode of CA certificate authentication, the client calls the CA certificate and automatically sends a connection request to the wireless access point, and the whole connection process automatically runs in the background.
For the wireless access point adopting the secondary authentication mode, after the wireless equipment establishes wireless connection with the wireless access point through the two-layer authentication, the wireless equipment can not be connected with a network through the wireless access point by default; it is further required to obtain network access rights through three-layer authentication.
In this embodiment, after the wireless device establishes wireless connection with the wireless access point through the two-layer authentication, the IP address allocated by the wireless access point is acquired through a DHCP manner.
In one preferred implementation of step S13,
a wireless device-installed client sends a three-tier authentication request to a network device.
In a preferred embodiment of the present application, the network device is an authentication server.
Preferably, the client installed in the wireless device calls a built-in browser or a browser installed in the wireless device, and inputs the three-layer authentication request in a pop-up page, wherein the three-layer authentication request is any network connection request; and after receiving the network connection request, the wireless access point redirects the Http request to an authentication server.
And when the three-layer authentication is in a portal authentication mode, the authentication server is a portal server. That is, the pop-up page is redirected to the Portal server's Web authentication homepage.
The three-layer authentication can be that the client terminal automatically initiates a connection request to a Portal server based on the authentication information of the three-layer authentication of the wireless access point, and the whole connection process automatically runs in the background;
the three-layer authentication may be to present authentication information of the three-layer authentication of the wireless access point to a user corresponding to the wireless device, for example, to send the authentication information of the three-layer authentication to the client in an in-application prompt message manner, and then, the user performs authentication based on the acquired authentication information, for example, to send a connection request to the Portal server in a manner that the user selects to manually input password information.
Preferably, the authentication information of the three-layer authentication may also be a verification code sent by the Portal server and obtained after the user inputs the mobile phone number in the Web authentication homepage.
And the Portal server initiates a release request for releasing the wireless equipment corresponding to the three-layer authentication request to the wireless access point after passing the authentication.
After the Portal server passes the authentication, the Portal server returns prompt information to the wireless equipment, and the prompt can be connected with the network.
Preferably, upon receiving a prompt that the Portal server can connect to the network, a prompt message, such as "connected to the network," can be pushed to the user on the client's list of wireless access points and/or the wireless device's list of native wireless access points.
In a preferred embodiment of the present application, the network device is a wireless access point.
Preferably, the client installed in the wireless device calls a built-in browser or a browser installed in the wireless device, and inputs the three-layer authentication request in a pop-up page, wherein the three-layer authentication request is any network connection request; the wireless access point redirects the network connection request to an authentication module of the wireless access point.
And when the three-layer authentication is in a portal authentication mode, the authentication module is a portal module. That is, the pop-up page is redirected to the Web authentication homepage of the Portal module.
The three-layer authentication can be that the client terminal automatically initiates a connection request to a Portal server based on the authentication information of the three-layer authentication of the wireless access point, and the whole connection process automatically runs in the background;
the three-layer authentication may be to present authentication information of the three-layer authentication of the wireless access point to a user corresponding to the wireless device, for example, to send the authentication information of the three-layer authentication to the client in an in-application prompt message manner, and then, the user performs authentication based on the acquired authentication information, for example, to send a connection request to the Portal module in a manner that the user selects to manually input password information.
Preferably, the authentication information of the three-layer authentication may also be a verification code sent by the Portal module, which is obtained after the user inputs the mobile phone number in the Web authentication homepage.
After the Portal module passes the authentication, prompt information is returned to the wireless equipment, and the prompt can be connected with the network.
Preferably, upon receiving a prompt that the Portal module can connect to the network, a prompt message, such as "connected to the network," can be pushed to the user on the client's list of wireless access points and/or the wireless device's list of native wireless access points.
In the embodiment, the connection with the wireless access point is established through the two-layer authentication, and the data of the wireless link is encrypted; network access rights are obtained through three-layer authentication to limit the use of network resources by a particular user (authorized user).
Fig. 2 is a schematic flowchart of a secondary authentication method for a WiFi network according to a second embodiment of the present application, as shown in fig. 2, including the following steps:
step S21, acquiring an acquisition request sent by a wireless device, wherein the acquisition request includes identification information of a wireless access point;
step S22, inquiring access information corresponding to the wireless access point, wherein the access information comprises password information of two-layer authentication;
and step S23, returning the access information corresponding to the wireless access point to the wireless equipment.
The execution subject of the method shown in fig. 2 may be an access server.
The access server includes, but is not limited to, a cloud service device, a remote storage service device, and the like. In a preferred embodiment of the present application, preferably, the access server is a cloud service device.
The wireless device includes, but is not limited to, any intelligent terminal device that can perform human-computer interaction with a user and can implement a wireless communication function, such as a smart phone, a tablet computer, a notebook computer, and the like.
The wireless access point may be an AP, a terminal device hotspot, etc., that provides wireless network access services. The wireless network includes, but is not limited to, a wireless local area network based on IEEE802.11 series standard protocols, for example, a wireless local area network based on IEEE802.11n protocol and IEEE802.11ac protocol, which is known as a WiFi network, and a wireless device can access the corresponding wireless network through the wireless access point. In the following embodiments of the present invention, a wireless access point accessing a WiFi network is taken as an example for description.
In one preferred implementation of step S21,
the access server acquires an acquisition request sent by the wireless equipment, wherein the acquisition request comprises identification information of the wireless access point. Preferably, the acquisition request includes a wireless access point scanning list established by the wireless device according to the scanned identification information of the wireless access point.
The identification information is SSID (Service Set Identifier) information of the wireless access point, and is used for identifying a wireless network corresponding to the wireless access point. The wireless access point encapsulates the SSID (Service Set Identifier) information thereof in the non-encrypted part of the data packet, and broadcasts the SSID information in a broadcast manner.
The method comprises the steps that a WiFi module of the wireless equipment scans wireless access points nearby the wireless equipment, SSID (Service Set Identifier) information of the one or more wireless access points is obtained based on the one or more scanned wireless access points, the SSID information of the one or more wireless access points is sent to a client of the wireless equipment, and a scanning list is established by the client.
Further, the SSID information may be further refined into BSSID (Basic Service Set Identifier) new information and ESSID (Extended Service Set Identifier) information, where the BSSID information is used to identify a smaller BSS area, each host communicates in the smaller area, and the ESSID information is applied to a larger-scale and more complex wireless network, where different BSSs may be Extended to corresponding ESS (Extended Service Set, multiple base station systems). In the subsequent embodiments of the present invention, the MAC (Media Access Control) of the wireless Access point is used as BSSID information of the wireless Access point.
Preferably, the identification information is SSID information and BSSID information of the wireless access point.
In one preferred implementation of step S22,
the access server searches and determines the access information of the corresponding wireless access point based on the SSID information and BSSID information of the wireless access point. Specifically, the access server stores a large amount of wireless access points and access information corresponding to the wireless access points. Each wireless access point stored in the access server is uniquely determined by its corresponding SSID information and BSSID information.
The access information comprises an authentication mode and password information of the wireless access point. The authentication mode of the wireless access point comprises the following steps: whether the authentication modes of secondary authentication, two-layer authentication and three-layer authentication in the secondary authentication are adopted or not; wherein the two-tier authentication comprises: open system authentication, PSK authentication, 802.1x authentication, WPS authentication and CA certificate authentication; the three-layer authentication comprises: portal authentication. The password information is password information of two-layer authentication and authentication information of three-layer authentication, wherein the password information of the two-layer authentication comprises a static secret key of PSK access authentication, a user name and a password of 802.1x access authentication, a PIN of WPS access authentication and a CA certificate of CAN certificate authentication.
Preferably, the access information of the wireless access point is obtained by an access server sending an access information query request to the wireless access point. And the access server sends an access information query request to the wireless access points in the scanning list according to the scanning list included in the acquisition request, and acquires the access information returned by the wireless access points according to the access information query request.
Preferably, the access information of the wireless access point is obtained by an access server querying an access information database periodically received from the wireless access point. The wireless access point reports the access information to the access server periodically, or reports the access information system to the access server when the configuration of the access information is changed. And the access server stores the access information into an access information database according to the identification information of the wireless access point. When an access server receives an acquisition request sent by wireless equipment, the access server inquires an access information database according to the identification information of the wireless access point in the acquisition request to obtain the access information of the wireless access point.
In one preferred implementation of step S23,
and the access server returns the access information corresponding to the wireless access point to the wireless equipment. And the wireless equipment establishes connection with one of the scanned at least one wireless access point through two-layer authentication according to the acquired wireless access point information, and performs network access through the wireless access point after a three-layer authentication request is successfully performed on the network equipment.
In this embodiment, by providing the two-layer authentication and three-layer authentication information of the wireless access point to the wireless device, the wireless device can establish a connection with the wireless access point through the two-layer authentication, and encrypt data of a wireless link; network access rights are obtained through three-layer authentication to limit the use of network resources by a particular user (authorized user).
Fig. 3 is a schematic flowchart of a secondary authentication method for a WiFi network according to a third embodiment of the present application, as shown in fig. 3, including the following steps:
step S31, performing two-layer authentication on the wireless device so that the wireless device establishes connection with the wireless access point;
and step S32, receiving the three-layer authentication request sent by the wireless equipment and carrying out three-layer authentication on the wireless equipment.
The main body of the method shown in fig. 3 may be a wireless access point, which may be an AP providing wireless network access service, a terminal device hotspot, or the like.
In one preferred implementation of step S31,
and the wireless equipment establishes wireless connection with the wireless access point through two-layer authentication according to the access information of the wireless access point acquired from the server.
The access information comprises an authentication mode and password information of the wireless access point. The authentication mode of the wireless access point comprises the following steps: whether the authentication modes of secondary authentication, two-layer authentication and three-layer authentication in the secondary authentication are adopted or not; wherein the two-tier authentication comprises: open system authentication, PSK authentication, 802.1x authentication and WPS authentication; the three-layer authentication comprises: portal authentication. The password information is password information of two-layer authentication and authentication information of three-layer authentication, wherein the password information of the two-layer authentication comprises a static secret key of PSK access authentication, a user name and a password of 802.1x access authentication, a PIN of WPS access authentication and a CA certificate of CAN certificate authentication.
For the wireless access point with the two-layer authentication mode of open system authentication, the wireless access point directly allows the wireless equipment to access.
For the wireless access point adopting the secondary authentication mode, after the wireless equipment establishes wireless connection with the wireless access point through the two-layer authentication, the wireless equipment can not be connected with a network through the wireless access point by default; it is further required to obtain network access rights through three-layer authentication.
In this embodiment, after performing two-layer authentication on a wireless device, an IP address is allocated to the wireless device by using a DHCP method.
In one preferred implementation of step S32,
preferably, the wireless access point receives a three-layer authentication request sent by a client installed in the wireless device; redirecting the three-layer authentication request to an authentication server, and performing three-layer authentication on the wireless equipment by the authentication server; receiving a release request for releasing the wireless equipment, which is initiated after the authentication of the authentication server passes; or, the wireless access point receives a three-layer authentication request sent by a client installed in the wireless equipment, and performs three-layer authentication on the wireless equipment; and releasing the wireless equipment after the authentication is passed.
In a preferred embodiment of the present application,
the three-layer authentication request is any network connection request; and after receiving the network connection request, the wireless access point redirects the Http request to an authentication server, and the authentication server performs three-layer authentication on the wireless equipment.
And when the three-layer authentication is in a portal authentication mode, the authentication server is a portal server. That is, the pop-up page is redirected to the Portal server's Web authentication homepage.
The three-layer authentication can be that the client terminal automatically initiates a connection request to a Portal server based on the authentication information of the three-layer authentication of the wireless access point, and the whole connection process automatically runs in the background;
the three-layer authentication may be to present authentication information of the three-layer authentication of the wireless access point to a user corresponding to the wireless device, for example, to send the authentication information of the three-layer authentication to the client in an in-application prompt message manner, and then, the user performs authentication based on the acquired authentication information, for example, to send a connection request to the Portal server in a manner that the user selects to manually input password information.
Preferably, the authentication information of the three-layer authentication may also be a verification code sent by the Portal server and obtained after the user inputs the mobile phone number in the Web authentication homepage.
And the wireless access point receives a release request which is initiated by the Portal server after the authentication of the Portal server passes and releases the wireless equipment corresponding to the three-layer authentication request, and releases the network request of the wireless equipment.
In a further preferred embodiment of the present application,
the three-layer authentication request is any network connection request; and after receiving the network connection request, the wireless access point redirects the network connection request to an authentication module of the wireless access point.
And when the three-layer authentication is in a portal authentication mode, the authentication module is a portal module. That is, the pop-up page is redirected to the Web authentication homepage of the Portal module.
The three-layer authentication can be that the client terminal automatically initiates a connection request to a Portal server based on the authentication information of the three-layer authentication of the wireless access point, and the whole connection process automatically runs in the background;
the three-layer authentication may be to present authentication information of the three-layer authentication of the wireless access point to a user corresponding to the wireless device, for example, to send the authentication information of the three-layer authentication to the client in an in-application prompt message manner, and then, the user performs authentication based on the acquired authentication information, for example, to send a connection request to the Portal module in a manner that the user selects to manually input password information.
Preferably, the authentication information of the three-layer authentication may also be a verification code sent by the Portal module, which is obtained after the user inputs the mobile phone number in the Web authentication homepage.
After the Portal module of the wireless access point passes the authentication, the Portal module returns prompt information to the wireless equipment, and the prompt can be connected with the network.
In this embodiment, the wireless access point performs two-layer authentication on the wireless device, so that the data of the wireless link is encrypted without establishing connection with the wireless access point by the wireless device; the network device is given network access through three-layer authentication so as to limit a specific user (authorized user) to use the network resource.
Fig. 4 illustrates a block diagram of an exemplary computer system/server 012 suitable for use in implementing embodiments of the invention. The computer system/server 012 shown in fig. 4 is only an example, and should not bring any limitation to the function and the scope of use of the embodiment of the present invention.
As shown in fig. 4, the computer system/server 012 is embodied as a general purpose computing device. The components of computer system/server 012 may include, but are not limited to: one or more processors or processing units 016, a system memory 028, and a bus 018 that couples various system components including the system memory 028 and the processing unit 016.
Bus 018 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or a local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Computer system/server 012 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer system/server 012 and includes both volatile and nonvolatile media, removable and non-removable media.
System memory 028 can include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)030 and/or cache memory 032. The computer system/server 012 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 034 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 4, commonly referred to as a "hard drive"). Although not shown in FIG. 4, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In such cases, each drive may be connected to bus 018 via one or more data media interfaces. Memory 028 can include at least one program product having a set (e.g., at least one) of program modules configured to carry out the functions of embodiments of the present invention.
Program/utility 040 having a set (at least one) of program modules 042 can be stored, for example, in memory 028, such program modules 042 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof might include an implementation of a network environment. Program modules 042 generally perform the functions and/or methodologies of embodiments of the present invention as described herein.
The computer system/server 012 may also communicate with one or more external devices 014 (e.g., keyboard, pointing device, display 024, etc.), hi the present invention, the computer system/server 012 communicates with an external radar device, and may also communicate with one or more devices that enable a user to interact with the computer system/server 012, and/or with any device (e.g., network card, modem, etc.) that enables the computer system/server 012 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 022. Also, the computer system/server 012 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the internet) via the network adapter 020. As shown in fig. 4, the network adapter 020 communicates with the other modules of the computer system/server 012 via bus 018. It should be appreciated that although not shown in fig. 4, other hardware and/or software modules may be used in conjunction with the computer system/server 012, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 016 executes the programs stored in the system memory 028, thereby performing the functions and/or methods of the described embodiments of the present invention.
The computer program described above may be provided in a computer storage medium encoded with a computer program that, when executed by one or more computers, causes the one or more computers to perform the method flows and/or apparatus operations shown in the above-described embodiments of the invention.
With the development of time and technology, the meaning of media is more and more extensive, and the propagation path of computer programs is not limited to tangible media any more, and can also be downloaded from a network directly and the like. Any combination of one or more computer-readable media may be employed. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (16)

1. A secondary authentication method of a WiFi network is characterized by comprising the following steps:
a client installed in the wireless equipment sends an acquisition request to an access server to acquire access information of a wireless access point returned by the access server; or searching the scanned access information corresponding to the wireless access point from the statistical information of the wireless access point acquired from the server in advance; the access information comprises password information of two-layer authentication and authentication information of three-layer authentication, wherein the authentication information of the three-layer authentication comprises a user name and a password of Portal authentication;
establishing connection with one wireless access point of the scanned at least one wireless access point through two-layer authentication according to the acquired access information of the wireless access points;
based on the authentication information of the three-layer authentication, the client installed in the wireless equipment sends a three-layer authentication request to the network equipment;
and after the three layers of authentication are successful, obtaining the network access authority.
2. The method of claim 1, wherein the access information of the wireless access point further comprises: authentication mode of wireless access point.
3. The method according to claim 2, wherein the authentication mode of the wireless access point includes whether to adopt an authentication mode of secondary authentication, two-layer authentication in the secondary authentication and three-layer authentication; wherein the two-layer authentication comprises open system authentication, PSK, 802.1x and WPS authentication; the three-layer authentication comprises Portal authentication; the cryptographic information of the two-layer authentication comprises at least one of: a static key of PSK access authentication, a user name and password of 802.1x access authentication, and a PIN of WPS access authentication.
4. The method of claim 3, wherein establishing a connection with one of the scanned at least one wireless access point through two-layer authentication according to the obtained access information of the wireless access point comprises:
displaying accessible prompt information of the wireless access point, which acquires the access information from the server, on the wireless access point list;
and establishing wireless connection with the corresponding wireless access point through two-layer authentication by utilizing the access information of the wireless access point selected by the user from the wireless access point list.
5. The method of claim 4, wherein establishing a connection with one of the scanned at least one wireless access point through two-layer authentication according to the obtained access information of the wireless access point further comprises:
and acquiring the IP address allocated by the wireless access point in a DHCP mode.
6. The method of claim 1,
the network equipment is an authentication server; the three-layer authentication request is redirected to an authentication page of an access server by a wireless access point;
the wireless equipment performs three-layer authentication on the authentication page by using the acquired authentication information of the three-layer authentication; and after the three layers of authentication are successful, the network access authority which is controlled by the access server to be released by the wireless access point is obtained.
7. The method of claim 1,
the network equipment is a wireless access point; the three-layer authentication request is redirected to an authentication page of an authentication module of the wireless access point by the wireless access point;
the wireless equipment performs three-layer authentication on the authentication page by using the acquired authentication information of the three-layer authentication; and after the three layers of authentication are successful, obtaining the network access right released by the wireless access point.
8. A secondary authentication method of a WiFi network is used for accessing a server, and is characterized by comprising the following steps:
acquiring an acquisition request sent by wireless equipment, wherein the acquisition request comprises identification information of a wireless access point and a wireless access point scanning list established by the wireless equipment according to the scanned identification information of the wireless access point;
inquiring access information corresponding to the wireless access point, wherein the access information comprises password information of two-layer authentication and authentication information of three-layer authentication, and the authentication information of the three-layer authentication comprises a user name and a password of Portal authentication;
returning access information corresponding to the wireless access point to the wireless equipment so that the wireless equipment establishes connection with the wireless access point through two-layer authentication according to the acquired access information of the wireless access point;
and obtaining the network access authority through the three-layer authentication based on the authentication information of the three-layer authentication.
9. The method of claim 8, wherein the access information further comprises: authentication mode of wireless access point.
10. The method according to claim 9, wherein the authentication mode of the wireless access point includes whether to adopt an authentication mode of secondary authentication, two-layer authentication in the secondary authentication and three-layer authentication; wherein the two-layer authentication comprises open system authentication, PSK, 802.1x and WPS authentication; the three-layer authentication comprises Portal authentication; the cryptographic information of the two-layer authentication comprises at least one of: a static key of PSK access authentication, a user name and password of 802.1x access authentication, and a PIN of WPS access authentication.
11. A secondary authentication method of a WiFi network is used for a wireless access point, and is characterized by comprising the following steps:
performing two-layer authentication on the wireless equipment so that the wireless equipment establishes connection with the wireless access point according to the acquired access information of the wireless access point; the access information of the wireless access point, which is returned by the access server, is obtained by sending an obtaining request to the access server through a client installed in the wireless equipment according to the obtained access information of the wireless access point; or, the access information corresponding to the scanned wireless access point is searched in the statistical information of the wireless access point obtained from the server in advance; the access information comprises password information of two-layer authentication and authentication information of three-layer authentication, wherein the authentication information of the three-layer authentication comprises a user name and a password of Portal authentication;
and receiving a three-layer authentication request sent by the wireless equipment, and performing three-layer authentication on the wireless equipment so that the wireless equipment obtains network access permission through three-layer authentication based on authentication information of the three-layer authentication.
12. The method of claim 11,
the two-layer authentication includes: open system authentication, PSK authentication, 802.1x authentication and WPS authentication; the three-layer authentication comprises: portal authentication.
13. The method of claim 11, further comprising:
after the wireless equipment is subjected to two-layer authentication, an IP address is allocated to the wireless equipment in a DHCP mode.
14. The method of claim 11,
receiving a three-layer authentication request sent by a wireless device, wherein the three-layer authentication of the wireless device comprises the following steps:
the method comprises the steps that a wireless access point receives a three-layer authentication request sent by a client installed in wireless equipment; redirecting the three-layer authentication request to an authentication server, and performing three-layer authentication on the wireless equipment by the authentication server; receiving a release request for releasing the wireless equipment, which is initiated after the authentication of the authentication server passes; or the like, or, alternatively,
the method comprises the steps that a wireless access point receives a three-layer authentication request sent by a client installed in wireless equipment and performs three-layer authentication on the wireless equipment; and releasing the wireless equipment after the authentication is passed.
15. An electronic device, characterized in that the electronic device comprises:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-14.
16. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 14.
CN201810278111.7A 2018-03-30 2018-03-30 Secondary authentication method of WiFi network Active CN108521651B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810278111.7A CN108521651B (en) 2018-03-30 2018-03-30 Secondary authentication method of WiFi network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810278111.7A CN108521651B (en) 2018-03-30 2018-03-30 Secondary authentication method of WiFi network

Publications (2)

Publication Number Publication Date
CN108521651A CN108521651A (en) 2018-09-11
CN108521651B true CN108521651B (en) 2022-04-22

Family

ID=63431007

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810278111.7A Active CN108521651B (en) 2018-03-30 2018-03-30 Secondary authentication method of WiFi network

Country Status (1)

Country Link
CN (1) CN108521651B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109862605B (en) * 2019-01-22 2021-12-07 上海尚往网络科技有限公司 Networking method and equipment for terminal equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101651682A (en) * 2009-09-15 2010-02-17 杭州华三通信技术有限公司 Method, system and device of security certificate
CN102088702A (en) * 2009-12-03 2011-06-08 中国电信股份有限公司 Method and system for accessing wireless network into user residential gateway
CN102970732A (en) * 2012-11-26 2013-03-13 中兴通讯股份有限公司 Method, system and equipment for wireless local area network (WLAN) sharing authentication
CN105592454A (en) * 2014-10-21 2016-05-18 中兴通讯股份有限公司 Method and system for realizing WLAN sharing and WLAN sharing register server
CN106954212A (en) * 2017-03-02 2017-07-14 上海斐讯数据通信技术有限公司 A kind of portal authentication method and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015043649A1 (en) * 2013-09-27 2015-04-02 Arcelik Anonim Sirketi Connecting a household appliance to wlan using a temporary network
CN105472703A (en) * 2014-09-11 2016-04-06 中兴通讯股份有限公司 Wireless network access method and device
US10735954B2 (en) * 2016-09-02 2020-08-04 Blackberry Limited Method and device for facilitating authentication over a wireless network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101651682A (en) * 2009-09-15 2010-02-17 杭州华三通信技术有限公司 Method, system and device of security certificate
CN102088702A (en) * 2009-12-03 2011-06-08 中国电信股份有限公司 Method and system for accessing wireless network into user residential gateway
CN102970732A (en) * 2012-11-26 2013-03-13 中兴通讯股份有限公司 Method, system and equipment for wireless local area network (WLAN) sharing authentication
CN105592454A (en) * 2014-10-21 2016-05-18 中兴通讯股份有限公司 Method and system for realizing WLAN sharing and WLAN sharing register server
CN106954212A (en) * 2017-03-02 2017-07-14 上海斐讯数据通信技术有限公司 A kind of portal authentication method and system

Also Published As

Publication number Publication date
CN108521651A (en) 2018-09-11

Similar Documents

Publication Publication Date Title
EP3072334B1 (en) Method, system and apparatus for automatically connecting to wlan
US10848946B2 (en) Network access method, device, and system
JP6842919B2 (en) Network connection method, hotspot terminal and management terminal
US9882896B2 (en) System and method for secure login, and apparatus for same
EP2753108B1 (en) Wireless local area network authentication method and mobile terminal
US20230344626A1 (en) Network connection management method and apparatus, readable medium, program product, and electronic device
CN101008892B (en) Wireless network interactive graphic user interface display system
CN110113250B (en) Method for sharing wireless access point through instant messaging software
CN108093461B (en) Method for connecting wireless access point
US20210136577A1 (en) Method and a device for wireless connection
US20160315773A1 (en) Method and apparatus for providing information
US10362608B2 (en) Managing wireless client connections via near field communication
CN112672351A (en) Wireless local area network authentication method and device, electronic equipment and storage medium
CN111182546A (en) Method, equipment and system for accessing wireless network
CN107969003B (en) Wireless access authentication method
CN107770835B (en) Method, equipment and computer storage medium for connecting wireless access point
CN108521651B (en) Secondary authentication method of WiFi network
CN110113802A (en) A kind of method of the configuration information of shared wireless access point
KR20130002044A (en) A method for detecting illegal access point and a wlan device therefor
WO2017075972A1 (en) Resource sharing method and apparatus
WO2019179476A1 (en) Wireless access point related information providing and acquisition method
CN108282784B (en) Wireless network access method, MiFi terminal, mobile terminal and storage medium
CN112135253B (en) Network connection method and device
US20130007843A1 (en) Method, Program Product, and System of Network Connection in a Wireless Local Area Network
CN113905380A (en) Access stratum security algorithm processing method, system, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210416

Address after: Zone E, 9th floor, No.1 Lane 666, zhangheng Road, China (Shanghai) pilot Free Trade Zone, 201203

Applicant after: Shanghai Shangxiang Network Technology Co.,Ltd.

Address before: 312599 B-2, 3 floor, Jiayi Plaza, 127 East Renmin Road, Nanming street, Xinchang, Shaoxing, Zhejiang

Applicant before: LIANSHANG (XINCHANG) NETWORK TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant