CN113347626B - Wireless network access method, wireless access equipment and terminal equipment - Google Patents

Wireless network access method, wireless access equipment and terminal equipment Download PDF

Info

Publication number
CN113347626B
CN113347626B CN202110558916.9A CN202110558916A CN113347626B CN 113347626 B CN113347626 B CN 113347626B CN 202110558916 A CN202110558916 A CN 202110558916A CN 113347626 B CN113347626 B CN 113347626B
Authority
CN
China
Prior art keywords
wireless access
equipment
access
authentication
authentication information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110558916.9A
Other languages
Chinese (zh)
Other versions
CN113347626A (en
Inventor
田新雪
蒙睿
肖征荣
马书惠
杨子文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202110558916.9A priority Critical patent/CN113347626B/en
Publication of CN113347626A publication Critical patent/CN113347626A/en
Application granted granted Critical
Publication of CN113347626B publication Critical patent/CN113347626B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0433Key management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/10Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems
    • H04W84/045Public Land Mobile systems, e.g. cellular systems using private Base Stations, e.g. femto Base Stations, home Node B
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a wireless network access method, wireless access equipment and terminal equipment, wherein the method comprises the following steps: when an access request sent by a terminal device is received, acquiring first authentication information carried in the access request and an identifier of a first wireless access device to which the terminal device belongs; broadcasting an access authentication application message carrying time information, a terminal identifier of a terminal device and first authentication information in a block chain network, so that a first wireless access device can perform access authentication for the terminal device according to the access authentication application message; the time information is the time information when the second wireless access equipment receives the access request; and in response to receiving the authentication passing message broadcast by the first wireless access equipment in the block chain network, determining to allow the terminal equipment to access the second wireless access equipment. The method enables a terminal device belonging to a first wireless access device to access a second wireless access device after leaving the coverage area of the first wireless access device.

Description

Wireless network access method, wireless access equipment and terminal equipment
Technical Field
The invention relates to the technical field of block chains, in particular to a wireless network access method, wireless access equipment and terminal equipment.
Background
At present, most households are provided with WiFi (Wireless Fidelity, wireless network) for mobile terminals in a household to access, but when a mobile terminal moves to a place which cannot be covered by the household WiFi, the mobile terminal cannot obtain WiFi services provided by the household WiFi, even if the mobile terminal can search information of a plurality of WiFi access points, the mobile terminal cannot access because of no access authorization of the WiFi access points, at this time, the household WiFi may be in an idle state, how to enable the mobile terminal to access other household WiFi after leaving the coverage of the household WiFi, and meanwhile, enabling other mobile terminals to access the household WiFi to which the mobile terminal belongs after leaving the coverage of the household WiFi to which the mobile terminal belongs becomes a problem which needs to be solved urgently at present.
Disclosure of Invention
Therefore, the invention provides a wireless network access method, wireless access equipment and terminal equipment, and aims to solve the problem that in the prior art, the terminal equipment cannot obtain WiFi access service because the terminal equipment leaves the coverage area of the wireless access equipment to which the terminal equipment belongs.
In order to achieve the above object, a first aspect of the present invention provides a wireless network access method, including:
when an access request sent by a terminal device is received, acquiring first authentication information carried in the access request and an identifier of a first wireless access device to which the terminal device belongs;
broadcasting an access authentication application message carrying time information, a terminal identifier of the terminal equipment and the first authentication information in a block chain network, so that the first wireless access equipment can perform access authentication for the terminal equipment according to the access authentication application message; the time information is the time information when the second wireless access equipment receives the access request;
in response to receiving an authentication passing message broadcast by the first wireless access device in the blockchain network, determining to allow the terminal device to access the second wireless access device;
when receiving an access authentication application message broadcast by other wireless access equipment in a block chain network, acquiring time information, a terminal identifier and first authentication information carried in the access authentication application message;
determining second authentication information according to the time information and the current password carried in the access authentication application message broadcast by the other wireless access equipment in the blockchain network, and determining third authentication information according to the terminal identifier and the first authentication information carried in the access authentication application message broadcast by the other wireless access equipment in the blockchain network; the current cipher book is the same as the current cipher book of the terminal equipment belonging to the wireless access equipment;
and broadcasting an authentication passing message in the block chain network under the condition that the third authentication information and the second authentication information meet preset conditions.
In some embodiments, the determining, according to the terminal identifier and the first authentication information carried in an access authentication application message broadcast by the other wireless access device in a blockchain network, third authentication information includes:
determining a secret key shared by the wireless access equipment and the terminal equipment corresponding to the terminal identification according to the terminal identification carried in the access authentication application message broadcast by the other wireless access equipment in the block chain network;
and determining third authentication information according to the key and the first authentication information carried in the access authentication application message broadcast by the other wireless access equipment in the blockchain network.
In some embodiments, the determining second authentication information according to the time information and the current codebook carried in the access authentication application message broadcast by the other wireless access device in the blockchain network includes:
calculating and generating a password serial number according to the time information carried in the access authentication application message broadcast by the other wireless access equipment in the block chain network;
and determining that the password information corresponding to the password serial number in the current password book is second authentication information.
In some embodiments, the method further comprises:
and updating the codebook according to a preset updating period.
In order to achieve the above object, a second aspect of the present invention provides a wireless network access method, including:
responding to the first wireless access equipment which the terminal equipment can not access, and determining second wireless access equipment;
determining first authentication information according to current time information, a current cipher book and a secret key shared by the terminal equipment and the first wireless access equipment, and sending an access request carrying the first authentication information and an identifier of the first wireless access equipment to the second wireless access equipment so that the second wireless access equipment applies for access authentication of the terminal equipment to the first wireless access equipment according to the access request.
In some embodiments, the determining first authentication information according to the current time information, the current codebook and the key shared by the terminal device and the first radio access device includes:
calculating and generating a password serial number according to the current time information;
determining that the password information corresponding to the password serial number in the current password book is third authentication information;
and determining first authentication information according to the third authentication information and a secret key shared by the terminal equipment and the first wireless access equipment.
In some embodiments, the method further comprises:
and updating the codebook according to a preset updating period.
In order to achieve the above object, a third aspect of the present invention provides a wireless access apparatus, including:
the receiving module is used for receiving an access request sent by the terminal equipment; and means for receiving an authentication pass message broadcast by the first wireless access device in the blockchain network; the access authentication application message is used for receiving the access authentication application message broadcast by other wireless access equipment in the blockchain network;
an obtaining module, configured to, in response to the receiving module receiving an access request sent by a terminal device, obtain first authentication information carried in the access request and an identifier of the first wireless access device to which the terminal device belongs; the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for responding to an access authentication application message broadcasted by other wireless access equipment in a blockchain network and acquiring time information, a terminal identifier and first authentication information carried in the access authentication application message;
a broadcast module, configured to broadcast an access authentication application message carrying time information, a terminal identifier of the terminal device, and the first authentication information in the blockchain network, so that the first wireless access device performs access authentication for the terminal device according to the access authentication application message; the time information is the time information when the second wireless access equipment receives the access request; the authentication passing message is broadcasted in the block chain network under the condition that the processing module determines that the third authentication information and the second authentication information meet the preset condition;
a processing module, configured to determine that the terminal device is allowed to access the second wireless access device in response to the receiving module receiving an authentication passing message broadcast by the first wireless access device in the blockchain network; the second authentication information is determined according to the time information and the current password book carried in the access authentication application message broadcast by the other wireless access equipment in the blockchain network, and the third authentication information is determined according to the terminal identifier and the first authentication information carried in the access authentication application message broadcast by the other wireless access equipment in the blockchain network; and the current code book is the same as the current code book of the terminal equipment belonging to the wireless access equipment.
In some embodiments, the processing module is to:
determining a secret key shared by the wireless access equipment and the terminal equipment corresponding to the terminal identification according to the terminal identification carried in the access authentication application message broadcast by the other wireless access equipment in the block chain network;
and determining third authentication information according to the key and the first authentication information carried in the access authentication application message broadcast by the other wireless access equipment in the blockchain network.
In order to achieve the above object, a fourth aspect of the present invention provides a terminal device, including:
the processing module is used for responding to the first wireless access equipment which the terminal equipment cannot access, and determining second wireless access equipment; the first authentication information is determined according to the current time information, the current cipher book and a secret key shared by the terminal equipment and the first wireless access equipment;
a sending module, configured to send an access request carrying the first authentication information and the identifier of the first wireless access device to the second wireless access device, so that the second wireless access device applies for access authentication for the terminal device to the first wireless access device according to the access request.
The invention has the following advantages:
in the wireless network access method provided by the embodiment of the present invention, when a terminal device leaves a coverage area of a first wireless access device to which the terminal device belongs, the terminal device cannot be connected to the first wireless access device, an access request carrying first authentication information and an identifier of the first wireless access device may be sent to a second wireless access device, the second wireless access device applies for access authentication for the terminal device to the first wireless access device in a blockchain network according to time information, the terminal identifier, and the first authentication information, and the second wireless access device may determine to allow the terminal device to access when receiving an authentication passing message broadcast by the first wireless access device in the blockchain network. The method enables the terminal equipment belonging to the first wireless access equipment to be accessed to the second wireless access equipment after leaving the coverage range of the first wireless access equipment, and similarly, other terminal equipment belonging to the second wireless access equipment can also be accessed to other wireless access equipment after leaving the coverage range of the second wireless access equipment.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention.
Fig. 1 is a first flowchart of a wireless network access method at a wireless access device side according to embodiment 1 of the present invention;
fig. 2 is a second flowchart illustrating a wireless network access method of a wireless access device according to embodiment 2 of the present invention;
fig. 3 is a schematic flowchart of determining third authentication information by a wireless access device according to embodiment 3 of the present invention;
fig. 4 is a schematic flowchart of determining second authentication information by a wireless access device according to embodiment 4 of the present invention;
fig. 5 is a schematic flowchart of a terminal device side wireless network access method according to embodiment 5 of the present invention;
fig. 6 is a schematic flowchart of determining first authentication information by a terminal device according to embodiment 6 of the present invention;
fig. 7 is a first schematic structural diagram of a wireless access device according to embodiment 7 of the present invention;
fig. 8 is a second schematic structural diagram of a wireless access device according to embodiment 8 of the present invention;
fig. 9 is a first schematic structural diagram of a terminal device according to embodiment 9 of the present invention;
fig. 10 is a schematic structural diagram of a terminal device according to embodiment 10 of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
It is to be understood that the specific embodiments and figures described herein are merely illustrative of the invention and are not to be considered as limiting.
It is to be understood that the embodiments and features of the embodiments can be combined with each other without conflict.
It is to be understood that, for the convenience of description, only parts related to the present invention are shown in the drawings of the present invention, and parts not related to the present invention are not shown in the drawings.
It should be understood that each unit and module related in the embodiments of the present invention may correspond to only one physical structure, may also be composed of multiple physical structures, or multiple units and modules may also be integrated into one physical structure.
It will be understood that, without conflict, the functions, steps, etc. noted in the flowchart and block diagrams of the present invention may occur in an order different from that noted in the figures.
It is to be understood that the flowchart and block diagrams of the present invention illustrate the architecture, functionality, and operation of possible implementations of systems, apparatus, devices and methods according to various embodiments of the present invention. Each block in the flowchart or block diagrams may represent a unit, module, segment, code, which comprises executable instructions for implementing the specified function(s). Furthermore, each block or combination of blocks in the block diagrams and flowchart illustrations can be implemented by hardware-based systems that perform the specified functions or by a combination of hardware and computer instructions.
It is to be understood that the units and modules involved in the embodiments of the present invention may be implemented by software, and may also be implemented by hardware, for example, the units and modules may be located in a processor.
The wireless network access method provided by the embodiment of the invention can be applied to wireless access equipment and terminals, wherein each wireless access equipment is accessed into a WiFi (wireless fidelity) shared area block chain network in advance to become one node, and states that the WiFi shared area block chain network is added in a public SSID (Service Set Identifier), such as homewifi@aaa.blockchain and visitwifi@aaa.blockchain, one terminal equipment can belong to a certain family WiFi, and the family WiFi to which the terminal equipment belongs can agree in advance to respectively maintain the same codebook and agree with a shared key SK in advance.
As shown in fig. 1, an embodiment of the present invention provides a wireless network access method, which may be applied to a wireless access device, and the method may include the following steps:
step 11, when receiving an access request sent by the terminal device, acquiring the first authentication information carried in the access request and an identifier of a first wireless access device to which the terminal device belongs.
The access request is sent by the terminal device (hereinafter referred to as M1) to the second wireless access device (hereinafter referred to as visitwifi) after leaving the coverage of the first wireless access device (hereinafter referred to as homewifi) to which the terminal device belongs.
M1 belongs to homewifi, and after leaving the coverage of homewifi, M1 automatically searches WiFi information with a suffix of @ aaa. Blockchain, for example, finds WiFi information of visitwifi@aaa.blockchain. M1 can determine first authentication information (hereinafter referred to as E (RK)) according to the current time information Tn, the current codebook of M1 and the key SK shared by M1 and homewifi, and sends an access request carrying an E (RK) and a homewifi identifier to visitwifi. And responding to the received access request sent by the M1 by the visitwifi, and acquiring the E (RK) and homewifi identifiers carried in the access request.
It should be noted that M1 may also determine first authentication information (hereinafter referred to as E (RK, RAND)) according to the current time information Tn, the current codebook of M1, the secret key SK shared by M1 and homewifi, and the generated random number RAND, and send an access request carrying an identifier of E (RK, RAND), RAND, and homewifi to visitwifi. The visitwifi responds to the received access request sent by the M1, and the E (RK, RAND), RAND and homewifi identifications carried in the visitwifi are obtained.
And step 12, broadcasting an access authentication application message carrying the time information, the terminal identifier of the terminal equipment and the first authentication information in the blockchain network, so that the first wireless access equipment can perform access authentication for the terminal equipment according to the access authentication application message.
The time information is the time information when the second wireless access device receives the access request.
It should be noted that, because E (RK) is determined by M1 according to the current time information Tn, the current codebook of M1, and the key SK shared by M1 and homewifi, or because E (RK, RAND) is determined by M1 according to the current time information Tn, the current codebook of M1, the key SK shared by M1 and homewifi, and the generated random number RAND, tn may also be carried in the access request sent by M1 to visitwifi. In the embodiment of the present invention, because an error between the time when M1 determines that E (RK) (or E (RK, RAND)) and the time when visitwifi receives the access request sent by M1 is very small or even negligible, visitwifi may regard the time when the access request sent by M1 does not carry Tn as Tn.
Under the condition that the access request does not carry the RAND, the visitwifi can broadcast an access authentication application message carrying Tn, M1 identification and E (RK) in the blockchain network by adopting a broadcast message mode of private key signature so as to apply for M1 access authentication to homewifi in the blockchain network. It should be noted that, in the case that the access request carries the RAND, the visitwifi may broadcast an access authentication application message carrying Tn, M1 identity, E (RK, RAND) and RAND in the blockchain network in a broadcast message manner of private key signature, so as to apply for M1 for access authentication from the homewifi in the blockchain network.
And step 13, in response to receiving the authentication passing message broadcast by the first wireless access equipment in the blockchain network, determining to allow the terminal equipment to access the second wireless access equipment.
And in response to receiving an access authentication application message broadcasted by visitwifi in the blockchain network, the homewifi performs access authentication for M1 according to Tn, M1 identification and E (RK) carried in the access authentication application message, or performs access authentication for M1 according to Tn, M1 identification, E (RK, RAND) and RAND carried in the access authentication application message, and after the authentication is passed, the homewifi broadcasts an authentication passing message in the blockchain network.
If the Visitwifi receives the authentication passing message broadcasted by the homewifi in the block chain network, the Visitwifi can be determined to allow the M1 to access the Visitwifi.
As shown in fig. 2, the wireless network access method may further include the steps of:
step 21, when receiving an access authentication application message broadcasted by other wireless access devices in the blockchain network, acquiring the time information, the terminal identifier and the first authentication information carried in the access authentication application message.
When the homewifi receives the access authentication application message broadcasted by the visitwifi in the blockchain network, the blockchain account book can be inquired according to the identifier of the visitwifi to obtain the public key of the visitwifi, then the public key of the visitwifi is used for verifying the private key signature on the access authentication application message, and under the condition that the verification is passed, the homewifi can acquire the Tn identifier, the M1 identifier and the E (RK) carried in the access authentication application message.
It should be noted that the access authentication application message may also carry Tn, M1 identifier, E (RK, RAND), and RAND, and in the case of passing the verification, the homewifi may also obtain Tn, M1 identifier, E (RK, RAND), and RAND carried in the access authentication application message.
Step 22, determining the second authentication information according to the time information and the current password book carried in the access authentication application message broadcast by the other wireless access device in the blockchain network, and determining the third authentication information according to the terminal identifier and the first authentication information carried in the access authentication application message broadcast by the other wireless access device in the blockchain network.
And the current code book is the same as the current code book of the terminal equipment belonging to the wireless access equipment. Since the terminal device and the wireless access device to which the terminal device belongs agree in advance to generate the same codebook and maintain the codebook according to the same rule, the wireless access device and the terminal device to which the wireless access device belongs have the same codebook at any time.
Because the M1 identifier obtained in step 21 is the identifier of the M1 belonging to the homewifi, the homewifi can determine that the visitfifi is applying for the assisted access authentication to the homewifi. Under the condition that Tn, M1 identification and E (RK) are obtained from the access authentication application message, the homewifi can determine second authentication information (RK') according to the current codebooks of Tn and homewifi, and determine third authentication information (RK) according to the M1 identification and the E (RK). Under the condition of acquiring the Tn, the M1 identifier, the E (RK, RAND) and the RAND from the access authentication application message, the homewifi can determine second authentication information (RK') according to the current codebooks of the Tn and the homewifi, and determine third authentication information (RK) according to the M1 identifier, the E (RK, RAND) and the RAND.
And step 23, broadcasting an authentication passing message in the blockchain network under the condition that the third authentication information and the second authentication information meet the preset condition.
The third authentication information and the second authentication information satisfying the preset condition may include: the third authentication information is identical to the second authentication information.
If the terminal equipment and the wireless access equipment to which the terminal equipment belongs respectively determine authentication information according to the same time information and the same password, the authentication information determined by the terminal equipment is necessarily the same as the authentication information determined by the wireless access equipment to which the terminal equipment belongs, so when the homewifi determines that the RK is consistent with the RK', the first authentication information can be determined by the M1, and the visitwifi applies to the homewifi for accessing the authentication and the terminal equipment really belongs to the homewifi. At the moment, the homewifi can broadcast the authentication passing message in the block chain network, so that the visitwifi can determine that the M1 is allowed to access the visitwifi.
It should be noted that the wireless network access method provided by the present invention can be applied to any wireless access device in the WiFi block chain shared network and a terminal device belonging to any wireless access device in the WiFi block chain shared network. In the embodiment of the present invention, the steps 21 to 23 are described by taking only an example that homewifi receives an access authentication application message broadcasted by visitffi in a blockchain network, and actually, the "other wireless access device" and the "local wireless access device" in the steps 21 to 23 may be any wireless access device in a WiFi shared blockchain network.
As can be seen from steps 11 to 13 and steps 21 to 23, in the wireless network access method provided in the embodiment of the present invention, when a terminal device leaves a coverage area of a first wireless access device to which the terminal device belongs, the terminal device cannot be connected to the first wireless access device, an access request carrying first authentication information and an identifier of the first wireless access device may be sent to a second wireless access device, the second wireless access device applies for access authentication for the terminal device to the first wireless access device in the blockchain network according to the time information, the terminal identifier, and the first authentication information, and the second wireless access device may determine to allow the terminal device to access when receiving an authentication pass message broadcast by the first wireless access device in the blockchain network. The method enables the terminal equipment belonging to the first wireless access equipment to be accessed to the second wireless access equipment after leaving the coverage range of the first wireless access equipment, and similarly, other terminal equipment belonging to the second wireless access equipment can also be accessed to other wireless access equipment after leaving the coverage range of the second wireless access equipment.
As shown in fig. 3, in some embodiments, the determining the third authentication information according to the terminal identifier and the first authentication information carried in the access authentication application message broadcast by the other wireless access device in the blockchain network (i.e. in step 22) may include the following steps:
step 221, determining a key shared by the wireless access device and the terminal device corresponding to the terminal identifier according to the terminal identifier carried in the access authentication application message broadcast by the other wireless access device in the blockchain network.
Still taking visitwifi, M1 and homewifi as examples, the homewifi can determine the secret key SK shared by the homewifi and M1 according to the M1 identifier.
Step 222, determining third authentication information according to the key and the first authentication information carried in the access authentication application message broadcast by the other wireless access device in the blockchain network.
Under the condition that Tn, the M1 identifier and the E (RK) are obtained from the access authentication application message, homewifi can decrypt the E (RK) by using the SK to obtain the RK. It should be noted that, in the case of obtaining Tn, M1 identifier, E (RK, RAND), and RAND from the access authentication application message, homewifi may decrypt E (RK, RAND) using SK and RAND to obtain RK.
As shown in fig. 4, in some embodiments, the determining the second authentication information according to the time information and the current codebook carried in the access authentication application message broadcast by the other wireless access device in the blockchain network (i.e., step 22) may include the following steps:
step 223, calculating and generating a password serial number according to the time information carried in the access authentication application message broadcast by other wireless access devices in the blockchain network.
Still taking visitwifi, M1 and homewifi as examples, homewifi can generate a numerical value N according to Tn by a preset algorithm, and the N is used as a password serial number.
Step 224, determining the password information corresponding to the password serial number in the current password book as the second authentication information.
The homewifi can use the Nth password information in the current password book as RK'.
It should be noted that, in the embodiment of the present invention, the specific execution sequence of step 221, step 222, step 223, and step 224 is not strictly limited, and it is only required to ensure that step 221 is executed before step 222 and step 223 is executed before step 224.
In some embodiments, the wireless network access method may further include the following steps when applied to a wireless access device: and updating the codebook according to a preset updating period.
In order to ensure that the terminal device and the wireless access device to which the terminal device belongs have the same codebook at any time, the terminal device and the wireless access device to which the terminal device belongs need not only to generate the same codebook in advance, but also need to update the codebook according to a preset update period and an update algorithm, where the update period may be 5 seconds, 10 seconds, 1 minute, and the like, and embodiments of the present invention do not specifically limit this.
As shown in fig. 5, an embodiment of the present invention provides a wireless network access method, which may be applied to a terminal device, where the method may include the following steps:
step 31, responding to the first wireless access device to which the terminal device can not access, determining the second wireless access device.
The M1 belongs to homewifi, after the M1 leaves the coverage range of the homewifi, the M1 cannot access the homewifi, and at the moment, wiFi information with a suffix name of @ aaa. Blockchain can be automatically searched, for example, wiFi information of visitwifi@aaa.blockchain is obtained through searching.
And step 32, determining first authentication information according to the current time information, the current codebook and the key shared by the terminal equipment and the first wireless access equipment, and sending an access request carrying the first authentication information and the identifier of the first wireless access equipment to the second wireless access equipment.
The terminal equipment sends an access request to the second wireless access equipment so that the second wireless access equipment applies for access authentication of the terminal equipment to the first wireless access equipment according to the access request.
M1 can determine first authentication information (hereinafter referred to as E (RK)) according to the current time information Tn, the current codebook of M1 and the key SK shared by M1 and homewifi, and sends an access request carrying an E (RK) and a homewifi identifier to visitwifi. It should be noted that M1 may also determine first authentication information (hereinafter referred to as E (RK, RAND)) according to the current time information Tn, the current codebook of M1, the secret key SK shared by M1 and homewifi, and the generated random number RAND, and send an access request carrying an identifier of E (RK, RAND), RAND, and homewifi to visitwifi.
After receiving the access request sent by the M1, the Visitwifi applies for the homewifi in the block chain network as the M1 to perform access authentication according to the access request, so as to determine whether the M1 is allowed to access the visiitwifi.
It can be seen from steps 31 to 32 that, in the wireless network access method provided in the embodiment of the present invention, when a terminal device leaves a coverage area of a first wireless access device to which the terminal device belongs, the terminal device cannot be connected to the first wireless access device, and may determine first authentication information according to current time information, a current codebook, and a secret key shared by the terminal device and the first wireless access device, and then send an access request carrying the first authentication information and an identifier of the first wireless access device to a second wireless access device, where the second wireless access device applies for access authentication for the terminal device to the first wireless access device in a block chain network, so as to determine whether to allow the terminal device to access the second wireless access device. The method enables the terminal equipment belonging to the first wireless access equipment to be accessed to the second wireless access equipment after leaving the coverage range of the first wireless access equipment, and similarly, other terminal equipment belonging to the second wireless access equipment can also be accessed to other wireless access equipment after leaving the coverage range of the second wireless access equipment.
As shown in fig. 6, in some embodiments, the determining the first authentication information according to the current time information, the current codebook and the key shared by the terminal device and the first radio access equipment (i.e. step 32) may include the following steps:
step 321, calculating and generating a password serial number according to the current time information.
M1 can generate a numerical value N according to Tn according to a preset algorithm, and the N is used as a password serial number.
Step 322, determining that the password information corresponding to the password serial number in the current password book is the third authentication information.
M1 may use the nth cipher information in the current codebook as RK.
Step 323, determining the first authentication information according to the third authentication information and the key shared by the terminal device and the first wireless access device.
M1 may encrypt RK using a shared key SK between M1 and homewifi to obtain E (RK). It should be noted that M1 may also generate a random number RAND, and encrypt RK and RAND using a secret key SK shared between M1 and homewifi to obtain E (RK, RAND).
In some embodiments, the wireless network access method may further include the following steps when applied to a terminal device: and updating the codebook according to a preset updating period.
In order to ensure that the terminal device and the wireless access device to which the terminal device belongs have the same codebook at any time, the terminal device and the wireless access device to which the terminal device belongs need not only to generate the same codebook in advance, but also need to update the codebook according to a preset update period and an update algorithm, where the update period may be 5 seconds, 10 seconds, 1 minute, and the like, and embodiments of the present invention do not specifically limit this.
The following briefly describes a wireless network access method provided by the present invention with reference to a specific embodiment:
step A1, the terminal device M1 belongs to the homeWiFi access device homewifi, the M1 and the homewifi agree in advance to generate the same codebook, and agree to update the codebook according to the same updating period, for example, the M1 and the homewifi update the codebook synchronously every 5 seconds.
Step A2, accessing homewifi and visitwifi into a WiFi sharing block chain network aaa-blockchain to become one of the nodes, and declaring that the device is added into the WiFi sharing block chain network in an open SSID (Service Set Identifier), namely, after adding a suffix name @ aaa-blockchain, the device becomes: homewifi@aaa.blockchain and visitwifi@aaa.blockchain.
And step A3, when the M1 leaves the coverage range of homewifi, automatically searching WiFi information with @ aaa. Blockchain in a suffix name, and searching to obtain the WiFi information of visitwifi@aaa.blockchain.
And step A4, M1 determines E (RK, RAND) according to the current time information Tn, the current cipher book of M1, the shared secret key SK of M1 and homewifi and the generated random number RAND, and sends an access request carrying the identifications of E (RK, RAND), RAND and homewifi to visitwifi.
M1 determines E (RK, RAND) according to the current time information Tn, the current codebook of M1, the key SK shared by M1 and homewifi, and the generated random number RAND, which may specifically include: m1 generates a numerical value N according to Tn according to a preset algorithm, N is used as a password serial number, then the Nth password information in the current password book is used as RK to generate a random number RAND, and the RK and the RAND are encrypted by using a secret key SK shared between M1 and homewifi to obtain E (RK, RAND).
And step A5, responding to the received access request sent by the M1 by the visitwifi, and acquiring the E (RK, RAND), RAND and homewifi identifications carried in the visitwifi.
And step A6, using a private key signature broadcast message mode to broadcast an access authentication application message carrying Tn, M1 identification, E (RK, RAND) and RAND in the block chain network by the visitwifi.
Wherein, the visitwifi takes the time when the access request sent by the M1 is received as Tn.
Step A7, responding to the received access authentication application message broadcasted by the visitwifi in the blockchain network, searching a blockchain account book according to the identifier of the visitwifi to obtain a public key of the visitwifi, verifying a private key signature on the access authentication application message by using the public key of the visitwifi, and obtaining Tn, M1 identifier, E (RK, RAND) and RAND carried in the access authentication application message after verification is passed.
And step A8, determining second authentication information RK' by the homewifi according to Tn and the current codebook, and determining RK according to the M1 identifier, the E (RK, RAND) and the RAND.
Determining second authentication information RK' by homewifi according to Tn and the current codebook, which may specifically include: and (3) generating a numerical value N according to Tn by the homewifi according to a preset algorithm, taking the N as a password serial number, and then taking the Nth password information in the current password book as RK'.
Determining RK according to the M1 identifier, the E (RK, RAND) and the RAND by homewifi, and specifically comprising the following steps: and determining a secret key SK shared by the homewifi and the M1 according to the M1 identification by the homewifi, and decrypting the E (RK, RAND) by using the SK and the RAND to obtain the RK.
And step A9, under the condition that the RK is consistent with the RK', the homewifi broadcasts an authentication passing message in the block chain network.
Step A10, the visitwifi determines that the M1 is allowed to access the visitwifi in response to receiving the authentication passing message broadcast by the homewifi in the blockchain network.
To this end, M1 may obtain WiFi access service provided by visitwifi.
Based on the same technical concept, as shown in fig. 7, an embodiment of the present invention further provides a wireless access device, where the wireless access device may include:
a receiving module 101, configured to receive an access request sent by a terminal device; and means for receiving an authentication pass message broadcast by the first wireless access device in the blockchain network; and the access authentication application message is used for receiving the broadcast of other wireless access devices in the block chain network.
An obtaining module 102, configured to, in response to the receiving module 101 receiving an access request sent by a terminal device, obtain first authentication information carried in the access request and an identifier of the first wireless access device to which the terminal device belongs; and the receiving module 101 is configured to, in response to receiving an access authentication application message broadcast by another wireless access device in the blockchain network, acquire time information, a terminal identifier, and first authentication information carried in the access authentication application message.
A broadcasting module 103, configured to broadcast an access authentication application message carrying time information, a terminal identifier of the terminal device, and the first authentication information in the blockchain network, so that the first wireless access device performs access authentication on the terminal device according to the access authentication application message; the time information is the time information when the second wireless access equipment receives the access request; and is configured to broadcast an authentication passing message in the blockchain network if the processing module 104 determines that the third authentication information and the second authentication information satisfy the preset condition.
A processing module 104, configured to determine that the terminal device is allowed to access the second wireless access device in response to the receiving module 101 receiving an authentication passing message broadcast by the first wireless access device in the blockchain network; the system comprises a block chain network, a first wireless access device and a second wireless access device, wherein the first wireless access device is used for receiving an access authentication application message broadcast by the block chain network, and the second wireless access device is used for receiving a terminal identification carried in the access authentication application message broadcast by the block chain network and the first authentication information; the current cipher book is the same as the current cipher book of the terminal equipment belonging to the wireless access equipment.
In some embodiments, the processing module 104 is specifically configured to:
determining a secret key shared by the wireless access equipment and the terminal equipment corresponding to the terminal identification according to the terminal identification carried in the access authentication application message broadcast by the other wireless access equipment in the block chain network;
and determining third authentication information according to the key and the first authentication information carried in the access authentication application message broadcast by the other wireless access equipment in the blockchain network.
In some embodiments, the processing module 104 is specifically configured to:
calculating and generating a password serial number according to the time information;
and determining that the password information corresponding to the password serial number in the current password book is second authentication information.
In some embodiments, as shown in fig. 8, the wireless access device may further include an updating module 105, and the updating module 105 is configured to update the codebook according to a preset updating period.
Based on the same technical concept, as shown in fig. 9, an embodiment of the present invention further provides a terminal device, where the terminal device may include:
a processing module 201, configured to determine a second wireless access device in response to that the terminal device cannot access the first wireless access device to which the terminal device belongs; and the first authentication information is determined according to the current time information, the current cipher book and the key shared by the terminal equipment and the first wireless access equipment.
A sending module 202, configured to send an access request carrying the first authentication information and the identifier of the first wireless access device to the second wireless access device, so that the second wireless access device applies for the access authentication of the terminal device to the first wireless access device according to the access request.
In some embodiments, the processing module 201 is specifically configured to:
calculating and generating a password serial number according to the current time information;
determining that the password information corresponding to the password serial number in the current password book is third authentication information;
and determining first authentication information according to the third authentication information and a secret key shared by the terminal equipment and the first wireless access equipment.
In some embodiments, as shown in fig. 10, the terminal device may further include an updating module 203, where the updating module 203 is configured to update the codebook according to a preset updating period.
It will be understood that the above embodiments are merely exemplary embodiments adopted to illustrate the principles of the present invention, and the present invention is not limited thereto. It will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the spirit and substance of the invention, and these modifications and improvements are also considered to be within the scope of the invention.

Claims (8)

1. A wireless network access method, the method comprising:
when an access request sent by a terminal device is received, acquiring first authentication information carried in the access request and an identifier of a first wireless access device to which the terminal device belongs;
broadcasting an access authentication application message carrying time information, a terminal identifier of the terminal equipment and the first authentication information in a block chain network, so that the first wireless access equipment can perform access authentication for the terminal equipment according to the access authentication application message; the time information is the time information when the second wireless access equipment receives the access request;
in response to receiving an authentication passing message broadcast by the first wireless access device in the blockchain network, determining to allow the terminal device to access the second wireless access device;
when receiving an access authentication application message broadcast by other wireless access equipment in a block chain network, acquiring time information, a terminal identifier and first authentication information carried in the access authentication application message;
determining second authentication information according to the time information and the current password book carried in the access authentication application message broadcast by the other wireless access equipment in the blockchain network, and determining third authentication information according to the terminal identification and the first authentication information carried in the access authentication application message broadcast by the other wireless access equipment in the blockchain network; the current cipher book is the same as the current cipher book of the terminal equipment belonging to the wireless access equipment; the first authentication information carried in the access authentication application message broadcast by the other wireless access equipment in the block chain network is authentication information determined by the terminal equipment belonging to the wireless access equipment by using a secret key shared with the wireless access equipment, appointed time information and a cipher book corresponding to the appointed time information, wherein the appointed time information is current time corresponding to the generation time of the first authentication information carried in the access authentication application message broadcast by the other wireless access equipment in the block chain network;
under the condition that the third authentication information and the second authentication information meet preset conditions, broadcasting an authentication passing message in the block chain network;
the method further comprises the following steps: the terminal equipment and the wireless access equipment to which the terminal equipment belongs are appointed in advance to generate the same code book, and the code book is synchronously updated according to a preset updating period and an updating algorithm respectively, so that the terminal equipment and the wireless access equipment to which the terminal equipment belongs are ensured to have the same code book at any time.
2. The method of claim 1, wherein the determining third authentication information according to the terminal identifier and the first authentication information carried in an access authentication application message broadcast by the other wireless access device in a blockchain network comprises:
determining a secret key shared by the wireless access equipment and the terminal equipment corresponding to the terminal identification according to the terminal identification carried in the access authentication application message broadcast by the other wireless access equipment in the block chain network;
and determining third authentication information according to the key and the first authentication information carried in an access authentication application message broadcast by the other wireless access equipment in the blockchain network.
3. The method of claim 1, wherein the determining second authentication information according to the time information and a current codebook carried in an access authentication application message broadcast by the other wireless access device in a blockchain network comprises:
calculating and generating a password serial number according to the time information carried in the access authentication application message broadcast by the other wireless access equipment in the block chain network;
and determining that the password information corresponding to the password serial number in the current password book is second authentication information.
4. A wireless network access method, the method comprising:
responding to the first wireless access equipment which the terminal equipment can not access, and determining second wireless access equipment;
determining first authentication information according to current time information, a current cipher book and a secret key shared by the terminal equipment and the first wireless access equipment, and sending an access request carrying the first authentication information and an identifier of the first wireless access equipment to the second wireless access equipment, so that the second wireless access equipment applies for access authentication of the terminal equipment to the first wireless access equipment according to the access request;
the second wireless access device is configured to determine second authentication information according to the time information and the current codebook carried in the access authentication application message broadcast by the other wireless access device in the blockchain network, and determine third authentication information according to the terminal identifier and the first authentication information carried in the access authentication application message broadcast by the other wireless access device in the blockchain network; the current cipher book is the same as the current cipher book of the terminal equipment belonging to the wireless access equipment;
the first authentication information carried in the access authentication application message broadcast by the other wireless access equipment in the blockchain network is authentication information determined by the terminal equipment belonging to the wireless access equipment by using a secret key shared with the wireless access equipment, appointed time information and a cipher book corresponding to the appointed time information, wherein the appointed time information is current time corresponding to the generation time of the first authentication information carried in the access authentication application message broadcast by the other wireless access equipment in the blockchain network; under the condition that the third authentication information and the second authentication information meet preset conditions, broadcasting an authentication passing message in the block chain network;
the terminal equipment and the wireless access equipment to which the terminal equipment belongs are appointed to generate the same cipher book in advance, and the cipher books are synchronously updated according to the preset updating period and the updating algorithm respectively, so that the terminal equipment and the wireless access equipment to which the terminal equipment belongs are ensured to have the same cipher book at any time.
5. The method of claim 4, wherein the determining the first authentication information according to the current time information, the current codebook and the key shared by the terminal device and the first radio access device comprises:
calculating and generating a password serial number according to the current time information;
determining that the password information corresponding to the password serial number in the current password book is third authentication information;
and determining first authentication information according to the third authentication information and a secret key shared by the terminal equipment and the first wireless access equipment.
6. A wireless access device, the wireless access device comprising:
the receiving module is used for receiving an access request sent by the terminal equipment; and means for receiving an authentication pass message broadcast by the first wireless access device in the blockchain network; the access authentication application message is used for receiving the access authentication application message broadcast by other wireless access equipment in the blockchain network;
an obtaining module, configured to, in response to the receiving module receiving an access request sent by a terminal device, obtain first authentication information carried in the access request and an identifier of the first wireless access device to which the terminal device belongs; the system comprises a receiving module, a terminal identification and first authentication information, wherein the receiving module is used for responding to an access authentication application message broadcasted by other wireless access equipment in a block chain network and acquiring time information, the terminal identification and the first authentication information carried in the access authentication application message;
a broadcasting module, configured to broadcast an access authentication application message carrying time information, a terminal identifier of the terminal device, and the first authentication information in the blockchain network, so that the first wireless access device performs access authentication on the terminal device according to the access authentication application message; the time information is the time information when the second wireless access equipment receives the access request; the authentication passing message is broadcasted in the block chain network under the condition that the processing module determines that the third authentication information and the second authentication information meet the preset condition;
a processing module, configured to determine that the terminal device is allowed to access the second wireless access device in response to the receiving module receiving an authentication passing message broadcast by the first wireless access device in the blockchain network; the second authentication information is determined according to the time information and the current password book carried in the access authentication application message broadcast by the other wireless access equipment in the blockchain network, and the third authentication information is determined according to the terminal identifier and the first authentication information carried in the access authentication application message broadcast by the other wireless access equipment in the blockchain network; the current codebook is the same as the current codebook of the terminal equipment belonging to the wireless access equipment, and an authentication passing message is broadcasted in the blockchain network under the condition that the third authentication information and the second authentication information meet the preset conditions;
the first authentication information carried in the access authentication application message broadcast by the other wireless access equipment in the blockchain network is authentication information determined by the terminal equipment belonging to the wireless access equipment by using a secret key shared with the wireless access equipment, appointed time information and a cipher book corresponding to the appointed time information, wherein the appointed time information is current time corresponding to the generation time of the first authentication information carried in the access authentication application message broadcast by the other wireless access equipment in the blockchain network;
and the updating module is used for generating the same code book by the terminal equipment and the wireless access equipment to which the terminal equipment belongs in advance in an appointed mode, and synchronously updating the code book according to a preset updating period and an updating algorithm respectively so as to ensure that the terminal equipment and the wireless access equipment to which the terminal equipment belongs have the same code book at any moment.
7. The wireless access device of claim 6, wherein the processing module is configured to:
determining a secret key shared by the wireless access equipment and the terminal equipment corresponding to the terminal identification according to the terminal identification carried in the access authentication application message broadcast by the other wireless access equipment in the block chain network;
and determining third authentication information according to the key and the first authentication information carried in the access authentication application message broadcast by the other wireless access equipment in the blockchain network.
8. A terminal device, characterized in that the terminal device comprises:
the processing module is used for responding to the first wireless access equipment which the terminal equipment cannot access, and determining second wireless access equipment; the first authentication information is determined according to the current time information, the current cipher book and a secret key shared by the terminal equipment and the first wireless access equipment;
a sending module, configured to send an access request carrying the first authentication information and an identifier of the first wireless access device to the second wireless access device, so that the second wireless access device applies for access authentication of the terminal device to the first wireless access device according to the access request;
the second wireless access device is configured to determine second authentication information according to the time information and the current codebook carried in the access authentication application message broadcast by the other wireless access device in the blockchain network, and determine third authentication information according to the terminal identifier and the first authentication information carried in the access authentication application message broadcast by the other wireless access device in the blockchain network; the current cipher book is the same as the current cipher book of the terminal equipment belonging to the wireless access equipment;
the first authentication information carried in the access authentication application message broadcast by the other wireless access equipment in the blockchain network is authentication information determined by the terminal equipment belonging to the wireless access equipment by using a secret key shared with the wireless access equipment, appointed time information and a cipher book corresponding to the appointed time information, wherein the appointed time information is current time corresponding to the generation time of the first authentication information carried in the access authentication application message broadcast by the other wireless access equipment in the blockchain network; under the condition that the third authentication information and the second authentication information meet preset conditions, broadcasting an authentication passing message in the block chain network;
the terminal equipment and the wireless access equipment to which the terminal equipment belongs are appointed in advance to generate the same code book, and the code book is synchronously updated according to a preset updating period and an updating algorithm respectively, so that the terminal equipment and the wireless access equipment to which the terminal equipment belongs are ensured to have the same code book at any time.
CN202110558916.9A 2021-05-21 2021-05-21 Wireless network access method, wireless access equipment and terminal equipment Active CN113347626B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110558916.9A CN113347626B (en) 2021-05-21 2021-05-21 Wireless network access method, wireless access equipment and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110558916.9A CN113347626B (en) 2021-05-21 2021-05-21 Wireless network access method, wireless access equipment and terminal equipment

Publications (2)

Publication Number Publication Date
CN113347626A CN113347626A (en) 2021-09-03
CN113347626B true CN113347626B (en) 2022-12-20

Family

ID=77470592

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110558916.9A Active CN113347626B (en) 2021-05-21 2021-05-21 Wireless network access method, wireless access equipment and terminal equipment

Country Status (1)

Country Link
CN (1) CN113347626B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110213046A (en) * 2019-05-30 2019-09-06 全链通有限公司 Auth method, equipment and storage medium based on alliance's block chain

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9451460B2 (en) * 2012-02-07 2016-09-20 Lg Electronics Inc. Method and apparatus for associating station (STA) with access point (AP)
US11689918B2 (en) * 2019-03-01 2023-06-27 Hewlett Packard Enterprise Development Lp Remote access point clustering for user authentication in wireless networks

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110213046A (en) * 2019-05-30 2019-09-06 全链通有限公司 Auth method, equipment and storage medium based on alliance's block chain

Also Published As

Publication number Publication date
CN113347626A (en) 2021-09-03

Similar Documents

Publication Publication Date Title
US11870765B2 (en) Operation related to user equipment using secret identifier
US20090253409A1 (en) Method of Authenticating Home Operator for Over-the-Air Provisioning of a Wireless Device
US9516501B2 (en) Authentication in a communications system
US20220295269A1 (en) Network access authentication method and device
WO2017180384A1 (en) Method and apparatus for using a biometric template to control access to a user credential for a shared wireless communication device
CN111212426A (en) Terminal access method, terminal, micro base station and access system
CN112512048B (en) Mobile network access system, method, storage medium and electronic device
CN111132305A (en) Method for 5G user terminal to access 5G network, user terminal equipment and medium
EP3852414B1 (en) Data processing method and data processing device thereof
EP3876129B1 (en) Integrity for mobile network data storage
CN111031475B (en) Method for collecting terminal position information, terminal, position collecting terminal and storage medium
CN113347626B (en) Wireless network access method, wireless access equipment and terminal equipment
CN113179515A (en) Method and device for verifying relay user equipment
CN113316145B (en) Wireless network access method, wireless access equipment and terminal equipment
US20220174490A1 (en) System, method, storage medium and equipment for mobile network access
CN113316144B (en) Wireless network access method, wireless access equipment and terminal equipment
CN111770488B (en) EHPLMN updating method, related equipment and storage medium
CN113316142B (en) Wireless network access method and device
CN113316140B (en) Wireless network access method, wireless access equipment and terminal
CN113316146B (en) Method, access point and terminal for providing network access service
CN113347628A (en) Method, access point and terminal for providing network access service
US20230112506A1 (en) Systems and methods for providing access to a wireless communication network based on radio frequency response information and context information
CN117527280A (en) Security authentication method and device for user terminal to access network and electronic equipment
CN117643087A (en) Verification method, device, equipment and storage medium
WO2020148222A1 (en) Network security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant