CN105338529B - Wireless network connection method and system - Google Patents
Wireless network connection method and system Download PDFInfo
- Publication number
- CN105338529B CN105338529B CN201510797438.1A CN201510797438A CN105338529B CN 105338529 B CN105338529 B CN 105338529B CN 201510797438 A CN201510797438 A CN 201510797438A CN 105338529 B CN105338529 B CN 105338529B
- Authority
- CN
- China
- Prior art keywords
- terminal
- router
- authorization
- wireless network
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a wireless network connection method and a wireless network connection system.A first terminal acquires a service set identifier of a router and sends an equipment information acquisition request of a second terminal associated with the router to the router; the router receives the equipment information acquisition request, selects a second terminal as authorization equipment to establish a communication link with the first terminal, and sends authorization information for accessing a wireless network to the first terminal; the first terminal sends the authorization information to the router for verification, and if the authorization information passes the verification, the first terminal is accessed into the wireless network of the router, so that the aim of automatically and quickly connecting the wireless network without exposing information such as the current wireless network password and the like is fulfilled, the excessive exposure of the security information of the wireless router, which is related to the current wireless network and a wireless network user, such as the password and the like, is avoided, and great convenience is brought to the user.
Description
Technical Field
The invention relates to the technical field of intelligent terminals, in particular to a wireless network connection method and a wireless network connection system.
Background
With the development of intelligent devices, the trend of more and more intelligentization of the intelligent devices is gradually developed, the network access capability is a necessary capability of the intelligent devices, and at present, more and more intelligent devices can be accessed to a WIFI network at any time and any place through a wireless fidelity (WIFI) module of the intelligent devices, so that users can perform network entertainment, interaction, device control and the like through using terminals; therefore, how to access the WIFI network more intelligently by the intelligent device becomes more important;
at present, the method for accessing the intelligent device to the WIFI network mainly comprises the steps of inputting a wireless password to perform security authentication and connection, so that a user needs to know the wireless network connection password and then manually input the wireless network connection password, the complexity and complexity of connection are problems in one aspect, the wireless network password is exposed to the outside, if the user is used with great care, serious security problems can be caused to the current whole wireless network environment, even daily account password information such as network use, finance and the like of the user can be leaked to the outside, serious loss is brought to the user, when some users only need to use the wireless network temporarily, the wireless network password is easier to be exposed by adopting the existing connection mode, due to the fact that the wireless network password is exposed to the outside, the network security of the user is poor, the potential security threat of the wireless network is improved, and inconvenience is brought to the user. In the conventional use process of the existing connection wireless router, actions such as over-dependence on the wireless router, connection authentication and the like are required to be carried out by the existing connection wireless router, so that information such as passwords of the wireless router and the like which are related to the safety of the current wireless network and wireless network users is over-exposed, and potential threats are caused to the safety of the wireless network.
Accordingly, the prior art is yet to be improved and developed.
Disclosure of Invention
The invention aims to provide a wireless network connection method and a wireless network connection system, and aims to solve the problem that the existing wireless routing passwords and other information are excessively exposed to cause potential threats to the security of a wireless network.
The technical scheme adopted by the invention for solving the technical problem is as follows:
a wireless network connection method, comprising:
A. a first terminal acquires a service set identifier of a router and sends a device information acquisition request of a second terminal associated with the router to the router;
B. the router receives the equipment information acquisition request, selects a second terminal as authorization equipment to establish a communication link with the first terminal, and sends authorization information for accessing a wireless network to the first terminal;
C. and the first terminal sends the authorization information to the router for verification, and if the authorization information passes the verification, the first terminal accesses the wireless network of the router.
The wireless network connection method, wherein,
the service set identification of the router is hidden.
The wireless network connection method, wherein, in the step B,
and if at least one of the second terminals associated with the router is in the same local area network as the first terminal, selecting the second terminal which is in the same local area network as the first terminal and has the highest priority as the authorization equipment according to the priority which is correspondingly set in advance.
The wireless network connection method, wherein, in the step B,
and when the second terminals associated with the router and the first terminal are in different local area networks, selecting the second terminal with the highest priority as the authorization equipment according to the priority correspondingly set in advance.
The wireless network connection method, wherein, in the step B,
when the selected second terminal and the first terminal are positioned in the same local area network;
the router returns the equipment information of the second terminal to the first terminal, and the first terminal sends an authorization request for accessing the wireless network to the second terminal according to the equipment information and acquires the authorization information returned by the second terminal.
The wireless network connection method, wherein, in the step B,
when the selected second terminal and the first terminal are located in different local area networks;
the router sends an authorization request for accessing a wireless network to the second terminal through a transit server, and the second terminal returns authorization information to the first terminal through the transit server and the router in sequence.
The wireless network connection method, wherein the device information includes a device name and a MAC address of the second terminal; the authorization information includes a verification code matched with verification data preset in the router.
A wireless networking system, comprising: the system comprises a first terminal, a second terminal and a router, wherein the first terminal is provided with an authorization request module, the router is provided with an authorization acquisition module, and the first terminal and the second terminal are provided with communication connection modules;
the authorization request module acquires the service set identifier of the router and sends an equipment information acquisition request of the second terminal to the router, and the authorization acquisition module receives the equipment information acquisition request and selects one second terminal as authorization equipment; the communication connection modules of the first terminal and the selected second terminal establish communication links with each other, and authorization information of a wireless network for accessing the router is sent to the first terminal; and the authorization request module sends the authorization information to the router for verification, and the router accesses the wireless network of the router after verifying the authorization information.
The wireless network connection system, wherein the router includes:
the local area network judging module is used for judging whether a second terminal and the first terminal are positioned in the same local area network or not;
the first authorization information returning module is used for returning the equipment information of the second terminal to the first terminal when the second terminal and the first terminal are positioned in the same local area network, and the first terminal sends an authorization request for accessing a wireless network to the second terminal according to the equipment information and acquires the authorization information returned by the second terminal.
The wireless network connection system, wherein the router includes:
the local area network judging module is used for judging whether a second terminal and the first terminal are positioned in the same local area network or not;
a second authorization information returning module, configured to return the second authorization information to the first terminal when the second terminal and the first terminal are located in different local area networks; and sending an authorization request for accessing a wireless network to the second terminal through a transit server, and returning authorization information to the first terminal by the second terminal through the transit server and the router in sequence.
The wireless network connection method and the wireless network connection system effectively solve the problem that the existing wireless routing passwords and other information are excessively exposed and cause potential threats to the wireless network security, acquire the service set identifier of the router through the first terminal, and send the equipment information acquisition request of the second terminal associated with the router to the router; the router receives the equipment information acquisition request, selects a second terminal as authorization equipment to establish a communication link with the first terminal, and sends authorization information for accessing a wireless network to the first terminal; the first terminal sends the authorization information to the router for verification, and if the authorization information passes the verification, the first terminal accesses a wireless network of the router; the aim of automatically and quickly connecting the wireless network without exposing information such as the password of the current wireless network is achieved, the phenomenon that the password of the wireless router and other information about the safety of the current wireless network and wireless network users are excessively exposed due to the fact that actions such as connection authentication and the like are required by the wireless router in the conventional use process is effectively avoided, potential threats to the safety of the wireless network are caused, and great convenience is brought to the users.
Drawings
Fig. 1 is a flowchart illustrating a wireless network connection method according to a preferred embodiment of the present invention.
Fig. 2 is a flowchart of a method of an embodiment of a wireless network connection method provided in the present invention.
Fig. 3 is a block diagram of a wireless network connection system according to a preferred embodiment of the present invention.
Detailed Description
The present invention provides a wireless network connection method and system, and in order to make the objects, technical solutions, and advantages of the present invention clearer and clearer, the present invention is further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, fig. 1 is a flowchart illustrating a wireless network connection method according to a preferred embodiment of the present invention, wherein the method includes the following steps:
step S100, a first terminal acquires a service set identifier of a router and sends a device information acquisition request of a second terminal associated with the router to the router;
step S200, the router receives the equipment information acquisition request, selects a second terminal as authorization equipment to establish a communication link with the first terminal, and sends authorization information for accessing a wireless network to the first terminal;
step S300, the first terminal sends the authorization information to the router for verification, and if the authorization information passes the verification, the first terminal accesses the wireless network of the router.
The above steps are described in detail with reference to specific examples.
In step S100, a first terminal acquires a service set identifier of a router, and sends a device information acquisition request of a second terminal associated with the router to the router. Specifically, the first terminal acquires the service set identifier of the router, sends a device information acquisition request to the router, and requests the device information of the second terminal associated with the router, which has acquired connection authorization. The first terminal and the second terminal equipment of the invention must support the WIFI status, namely a WiFi client mode, which is a working mode of WiFi. The first terminal or the second terminal comprises intelligent terminals such as a computer, a television, a mobile phone, a tablet computer, wearable equipment and an intelligent home. The first terminal communicates with the wireless router via a protocol-specific interaction. The specific protocol may be a known protocol or a proprietary protocol. Protocol-specific interactive content mandatory: wireless routing SSID, first terminal information [ device name, etc. ]. The wireless route is an SSID (Service Set Identifier), and preferably, the Service Set Identifier of the router is Set in a hidden manner, so that the possibility that the wireless route becomes an attack target can be effectively reduced by hiding the SSID. In actual application, after the first terminal enables the WIFI module and adds the SSID of the current wireless route [ ACCESS POINT ], the first terminal sends an authorization device, namely a device information acquisition request of the second terminal to the router. Router [ ACCESS POINT ]: WiFi Access Point is also a WiFi working mode, namely a WiFi hotspot, and supports passive connection.
In step S200, the router receives the device information acquisition request, selects a second terminal as an authorization device to establish a communication link with the first terminal, and sends authorization information for accessing a wireless network to the first terminal.
In practical application, because the second terminal has two situations, one is that the first terminal and the second terminal are in the same local area network, and the other is that the first terminal and the second terminal are not in the same local area network, preferably, the router reads the device information of the second terminal which is set correspondingly by the router and has been connected with authorization according to the device information acquisition request, and judges whether the second terminal and the first terminal are in the same local area network.
Specifically, after receiving the protocol interaction content of the first terminal, the wireless router may determine whether the second terminal and the first terminal are currently in the same local area network. If the first terminal and the second terminal are in the same local area network, the router returns the equipment information of the second terminal to the first terminal, the first terminal sends an authorization request for accessing the wireless network to the second terminal according to the equipment information, and the first terminal and the second terminal are directly interacted to finish authorization. In actual application, the first terminal establishes a communication link with the second terminal according to the equipment information of the second terminal, performs authorization interaction and acquires an authorization code of a wireless network connected with a wireless router; the first terminal sends the corresponding equipment identification information and the corresponding authorization code to the wireless router, and the wireless router performs network configuration on the first terminal according to the equipment identification information and the authorization code, so that the first terminal is connected with a wireless network of the wireless router. This indicates that there is a second terminal in the same local area network, and the first terminal and the second terminal interact directly to complete the authorization. At this time, the wireless router is used as an intermediary device, and does not directly participate in information transfer, but the intelligent terminal devices perform authorization interaction. Namely, the first terminal and the second terminal which is connected with authorization are subjected to authorization interaction.
Further, if the second terminal and the first terminal are not in the same local area network, that is, the selected second terminal and the selected first terminal are located in different local area networks; the router sends an authorization request for accessing a wireless network and an equipment information acquisition request to the second terminal through a transit server, and the second terminal returns authorization information to the first terminal sequentially through the transit server and the router. In actual application, the wireless router sends the equipment information acquisition request to a second terminal through a transit server; the second terminal sends the authorization code of the wireless network correspondingly connected with the wireless route of the first terminal to the first terminal through the transit server and the wireless route in turn; and the first terminal sends the corresponding equipment identification information and the corresponding authorization code to the wireless router, and the wireless router performs network configuration for the first terminal according to the equipment identification information and the authorization code, so that the first terminal is connected with a wireless network of the wireless router. If the second terminal does not exist in the local area network corresponding to the first terminal, the second terminal with the highest priority is found according to the priority, and then authorization interaction is carried out through the transit server.
Preferably, in practical application, there may be a plurality of intelligent terminals associated with the wireless router, and if there are a plurality of intelligent terminals, part of the intelligent terminals may be in the local area network of the first terminal, and part of the intelligent terminals may not be in the local area network of the first terminal, so that it is necessary to set how to select the second terminal performing the authorization interaction with the first terminal.
Specifically, in the step S200, if at least one of the second terminals associated with the router is in the same local area network as the first terminal, the second terminal with the highest priority in the same local area network as the first terminal is selected as the authorization device according to the priority set in advance correspondingly. Specifically, the number of second terminals in the same local area network as the first terminal is counted, and if the number of the second terminals is one, the second terminal is selected and the device information is sent to the first terminal; and if the number of the second terminals is multiple, selecting the second terminal with the highest priority according to the priorities preset correspondingly by the multiple second terminals and sending the equipment information to the first terminal.
That is, the number of the second terminals in the same local area network is counted, if the number of the second terminals is one, the second terminal is selected, the router sends the device information of the second terminal to the first terminal, a communication link with the second terminal is established according to the device information, and the authorization information of the wireless network connected with the router is acquired. If the number of the second terminals is multiple, selecting the second terminal with the highest priority according to the priorities preset correspondingly by the multiple second terminals, sending the equipment information of the second terminal to the first terminal by the router, establishing a communication link with the second terminal according to the equipment information, and acquiring the authorization information of the wireless network connected with the router.
Further, when the second terminals associated with the router and the first terminal are in different local area networks, the second terminal with the highest priority is selected as the authorization device according to the priority correspondingly set in advance. Specifically, the number of second terminals which are not in the same local area network as the first terminal is counted, if the number of the second terminals is one, the device information acquisition request is sent to the second terminal through the transit server, and an authorization code fed back by the second terminal is received and sent to the first terminal; if the number of the second terminals is multiple, determining the second terminal with the highest priority according to the priorities preset correspondingly by the multiple second terminals, sending the equipment information acquisition request to the second terminal with the highest priority through the transit server, receiving the authorization information fed back by the second terminal and sending the authorization information to the first terminal.
That is, counting the number of second terminals which are not in the same local area network, if the number of the second terminals is one, selecting the second terminal, and sending the device information acquisition request to the second terminal through a transit server by the wireless router; and the second terminal sends the authorization code of the wireless network correspondingly connected with the wireless route of the first terminal to the first terminal through the transit server and the wireless route in sequence. If the number of the second terminals is multiple, selecting the second terminal with the highest priority according to the priorities preset correspondingly by the multiple second terminals, and sending the equipment information acquisition request to the second terminal through a transit server by the wireless router; and the second terminal sends the authorization code of the wireless network correspondingly connected with the wireless route of the first terminal to the first terminal through the transit server and the wireless route in sequence.
The invention aims to reduce the cost of extra data flow and also aims to facilitate the authorization interaction. The specific selection method is as follows: the second terminal equipment can be connected with a plurality of second terminal equipment, and can also have a certain priority level, when more than one second terminal is arranged and is in the same local area network with the first terminal, the connection authorization request can be preferentially sent to the second terminal with the highest priority level. When the set second terminal and the first terminal are not in the same local area network, the second terminal in the same local area network with the first terminal is preferentially used for authorization, and when only one authorization terminal in the same local area network with the first terminal exists, the priority is invalid.
That is, if all the set second terminals exist in the local area network where the first terminal is located, the wireless router selects the high-priority second terminal as the current second terminal. And if the set second terminals do not exist in the local area network where the first terminal is located, the wireless router selects the second terminal with the high priority as the current second terminal. If the set second terminals exist inside and outside the local area network where the first terminal is located respectively, if only one second terminal exists in the same local area network, the priority is invalid, and the wireless router preferentially selects the second terminal in the same local area network where the first terminal is located as authorization equipment; if more than one second terminal is located in the same local area network, the second terminal needs to be judged according to the priority level in addition to the second terminal preferentially selected in the same local area network with the device to be connected, and the second terminal with the highest priority level is selected.
Further, when there is a second terminal and the first terminal in the same local area network, the step S200 specifically includes:
the router sends the equipment information of the second terminal to the first terminal; the first terminal analyzes the equipment information of the second terminal and establishes equipment connection with the second terminal; a first terminal sends an authorization request to a second terminal; and the second terminal sends an authorization response to the first terminal and sends the corresponding authorization code to the first terminal.
Specifically, the authorization information may be an authorization code, that is, a code value authorized or not authorized for the first terminal, may be a specific fixed value, or may be a randomly generated code generated according to an agreed rule agreed in advance by the second terminal and the wireless router, and it may be simply described that its value may be: 11 indicates authorization and 22 indicates no authorization. The device information of the second terminal may be a Media Access Control (MAC) address of the second terminal, that is, a MAC address uniquely determined with the intelligent terminal. Of course, the device information may also be other device information that can uniquely determine the intelligent terminal, and is not limited herein. Preferably, the device information includes a device name of the second terminal, and a MAC address; the authorization information includes a verification code matched with verification data preset in the router.
After the first terminal and the second terminal carry out authorization interaction, the first terminal applies for wireless network connection to the wireless router according to the authorization code and the corresponding equipment identification information, so that the first terminal obtains authorization, and then the wireless router carries out network configuration according to the equipment identification information of the first terminal, and the first terminal can be connected with a wireless network of the wireless router. The device identification information may be device information such as a MAC address, which can identify the first terminal, such as an International Mobile Equipment Identity (IMEI), and is not limited herein.
Preferably, in actual application, in order to reduce extra data traffic cost and facilitate authorization interaction, when the second terminal is not in the local area network where the first terminal is located, there are two ways, one is to enable the relay server to perform data interaction with the second terminal through network data, so as to implement authorization interaction between the first terminal and the second terminal. And the other way is that the transfer server performs short message interaction with the second terminal so as to realize authorization interaction between the first terminal and the second terminal.
Further, the step S200 specifically includes: the router sends the equipment information acquisition request and the equipment information of the second terminal to a transfer server; the transfer server sends the equipment information acquisition request to a second terminal in a data network or short message mode; the second terminal responds to the equipment information acquisition request of the first terminal and sends the corresponding authorization code to the transfer server; the transfer server sends the authorization code to the router; and the router sends the authorization code to the first terminal.
In step S300, the first terminal sends the authorization information to the router for verification, and if the verification is passed, the first terminal accesses the wireless network of the router. Specifically, the first terminal performs mutual authentication with the router according to the authorization information, so as to access the wireless network of the router. The authorization information includes the verification code matched with the verification data preset in the router.
Preferably, the step S300 specifically includes:
s301, the first terminal sends a wireless network connection request to the router, and sends corresponding equipment identification information and an authorization code to the router;
s302, the router analyzes the wireless network connection request, verifies an authorization code and correspondingly authorizes the first terminal;
and S303, the router performs network configuration on the first terminal according to the equipment identification information and the authorization code, so that the first terminal is connected with a wireless network of the router.
In practical application, the first terminal sends a wireless network connection request to the wireless router, corresponding equipment identification information and an authorization code are sent to the router, and after the router verifies the authorization code, network configuration is carried out on the corresponding first terminal according to the equipment identification information, so that the first terminal is connected with the wireless network of the wireless router.
The process steps of the present invention are described in detail below with reference to an application example. Referring to fig. 2, fig. 2 is a flowchart of a method of an embodiment of a wireless network connection method according to the present invention. Taking a first terminal as A, a wireless route as B and a second terminal as Cn, the method comprises the following steps: t1, device a enables WiFi, that is, a turns on WiFi, and then executes step T2, device a sends a device information acquisition request of wireless network authorization device Cn. Then, the process proceeds to step T3, and the wireless router B receives the device information acquisition request. And then, executing the step T4 to determine whether the wireless route B is provided with the equipment Cn, namely, determining whether the wireless route B has an authorized intelligent terminal, if so, executing the step T5, and if not, ending the process of the invention. Step T5, the wireless route B sequentially reads the information of the set connected device Cn, obtains the authorized device Cn therefrom, then executes step T6, determines whether the device Cn is in the local area network of the wireless route B, if yes, executes step T7, and if no, executes step T21.
Step T7, wireless route B sends the device information of device Cn to device a. And then the step T8 is carried out, and the equipment A analyzes the equipment information of the equipment Cn. Then step T9 is entered and device a establishes a device connection with device Cn. Then, proceeding to step T10, device a sends an authorization request to device Cn. Step T11, device Cn sends an authorization response to device a. Wherein the authorization response includes: an authorization code. Then entering a step T12, judging whether the equipment Cn authorizes the equipment A, if so, executing a step T13, and sending a wireless network connection request to the wireless router B by the equipment A; if not, step T14 is executed, and device a fails to acquire authorization. If the device a fails to acquire the authorization, step T15 is executed, and the device a displays an authorization failure prompt. After the step T13, the process proceeds to step T16, the wireless router B parses the request message, verifies the authorization code, then proceeds to step T17, if the wireless router B has authorized the device a, if so, the step T18 is executed, if not, the step T19 is executed, and the process ends. T18, wireless route B allocates network configuration information for device a. After T18, go to step T20, the network connection is successful.
In step T21, the wireless route B reads the information of the second terminal Cn with high priority, that is, when there is no second terminal in the local area network of the wireless route B, the second terminal Cn with the highest priority is selected. Then, step T22 is executed, and the wireless router B sends a device information acquisition request from the device a to the device Cn to the transit server (i.e., this is equivalent to an authorization request being issued to Cn). There are two ways, one is data network transmission and one is short message transmission.
After the step T22, if a data network interaction mode is adopted, executing the step T23, where the relay server sends an equipment information acquisition request of the equipment a to the equipment Cn through the data network; step T24 is executed again, and the device Cn responds to the device information acquisition request of the device A; then, step T25 is executed to receive the authorization acquisition authorization code of the device Cn to the device a by the transit server; step T30 is then performed.
After the step T22, if a short message interaction mode is adopted, executing the step T26, sending the device information of the device a to the device Cn by the transfer server in a short message to obtain; step T27 is executed again, and the device Cn responds to the device information acquisition request of the device A with the authorization code; then, the step T28 is executed, and the transfer server receives the Cn authorization code; then, the step T29 is executed, and the transit server organizes the request response of the A according to the authorization code; step T30 is then performed.
And step T30, the transfer server sends the authorization code to the wireless router B. After performing step T30, performing step T31, wireless route B sends the authorization code to device a; and the step T32 is entered again, the device A initiates a wireless connection request to the wireless route B. After step T32, step T17 is entered.
The detailed method flowchart of the present invention is shown above, and the wireless network connection method of the present invention can be clearly understood by referring to fig. 1.
According to the wireless network connection method provided by the invention, after the first terminal enables the WIFI module and adds the SSID of the current wireless route [ ACCESS POINT ], the first terminal sends an equipment information acquisition request of an authorization equipment, namely the second terminal, to the wireless route, and then establishes a communication link with the second terminal for authorization interaction so as to acquire the connection authorization of the wireless network. After the first terminal obtains the connection authorization, the first terminal sends request information carrying the authorization code and the equipment identifier to the wireless router, after the wireless router receives the request information, the wireless router verifies that the authorization code of the wireless network is correct, the request information of the first terminal is replied, and network configuration is carried out for the first terminal, so that the aim of automatically and quickly connecting the wireless network without exposing information such as the current wireless network password and the like is fulfilled, and the problems that the wireless router excessively depends on the wireless router in the conventional use process, actions such as connection authentication and the like are required to be carried out by the first terminal, and the information such as the password of the wireless router and the like which are related to the safety of the current wireless network and wireless network users is excessively exposed, and potential threats to the safety.
When some users only need to use the wireless network temporarily, the wireless network password does not need to be exposed, the network security is better protected, the wireless network can be hidden between the terminals by hiding the SSID, and in addition, the user can automatically connect the current wireless network only by knowing the SSID information of the current wireless network when needing to use the network through an authorization mechanism, so that the external exposure of the wireless network password is avoided, and the potential security threat of the wireless network is greatly reduced.
The user only needs to know the SSID information of the current wireless network to automatically complete the network connection action by the system, the speed of connecting the intelligent device with the WiFi network is greatly increased, the user experience is improved, meanwhile, the potential safety influence caused by direct external broadcasting of a wireless router is avoided, and the safety threat to the network due to exposure of information such as wireless network passwords is also greatly reduced.
Based on the above wireless network connection method, the present invention further provides a wireless network connection system, as shown in fig. 3, including:
the system comprises a first terminal, a router and a second terminal, wherein the first terminal is provided with an authorization request module, the router is provided with an authorization acquisition module, and the first terminal and the second terminal are provided with communication connection modules;
the authorization request module acquires the service set identifier of the router and sends an equipment information acquisition request of the second terminal to the router, and the authorization acquisition module receives the equipment information acquisition request and selects one second terminal as authorization equipment; the communication connection modules of the first terminal and the selected second terminal establish communication links with each other, and authorization information of a wireless network for accessing the router is sent to the first terminal; and the authorization request module sends the authorization information to the router for verification, and the router accesses the wireless network of the router after verifying the authorization information.
Further, the router includes:
the local area network judging module is used for judging whether a second terminal and the first terminal are positioned in the same local area network or not;
the first authorization information returning module is used for returning the equipment information of the second terminal to the first terminal when the second terminal and the first terminal are positioned in the same local area network, and the first terminal sends an authorization request for accessing a wireless network to the second terminal according to the equipment information and acquires the authorization information returned by the second terminal.
Further, the router includes:
the local area network judging module is used for judging whether a second terminal and the first terminal are positioned in the same local area network or not;
a second authorization information returning module, configured to return the second authorization information to the first terminal when the second terminal and the first terminal are located in different local area networks; and sending an authorization request for accessing a wireless network to the second terminal through a transit server, and returning authorization information to the first terminal by the second terminal through the transit server and the router in sequence.
The first terminal or the second terminal is various intelligent devices including a mobile phone, a tablet computer, a television, a personal computer, a wearable device and the like.
In summary, according to the wireless network connection method and system provided by the present invention, a first terminal obtains a service set identifier of a router, and sends a device information obtaining request of a second terminal associated with the router to the router; the router receives the equipment information acquisition request, selects a second terminal as authorization equipment to establish a communication link with the first terminal, and sends authorization information for accessing a wireless network to the first terminal; the first terminal sends the authorization information to the router for verification, and if the authorization information passes the verification, the first terminal accesses a wireless network of the router; the aim of automatically and quickly connecting the wireless network without exposing information such as the current wireless network password and the like is achieved, the phenomenon that actions such as wireless routing is excessively depended on in the conventional use process and connection authentication and the like are required to be carried out by the wireless network password and the like is effectively avoided, so that the information such as the wireless routing password and the like which are related to the safety of the current wireless network and wireless network users is excessively exposed, potential threats are caused to the safety of the wireless network, and great convenience is brought to the users.
It is to be understood that the invention is not limited to the examples described above, but that modifications and variations may be effected thereto by those of ordinary skill in the art in light of the foregoing description, and that all such modifications and variations are intended to be within the scope of the invention as defined by the appended claims.
Claims (9)
1. A wireless networking method, comprising:
A. a first terminal acquires a service set identifier of a router and sends a device information acquisition request of a second terminal associated with the router to the router;
B. the router receives the equipment information acquisition request, selects a second terminal as authorization equipment to establish a communication link with the first terminal, and sends authorization information for accessing a wireless network to the first terminal;
C. the first terminal sends the authorization information to the router for verification, and if the authorization information passes the verification, the first terminal accesses a wireless network of the router;
in the step B, the router reads the device information of the authorized second terminal correspondingly set by the router according to the device information acquisition request, and determines whether the second terminal and the first terminal are in the same local area network; if at least one of the second terminals associated with the router is in the same local area network as the first terminal, selecting the second terminal which is in the same local area network as the first terminal and has the highest priority as an authorization device according to the priority which is correspondingly set in advance; and if the number of the second terminals is one, selecting the second terminals and sending the equipment information to the first terminal.
2. The wireless network connection method according to claim 1,
the service set identification of the router is hidden.
3. The wireless network connection method according to claim 1, wherein in the step B,
and when the second terminals associated with the router and the first terminal are in different local area networks, selecting the second terminal with the highest priority as the authorization equipment according to the priority correspondingly set in advance.
4. The wireless network connection method according to claim 1, wherein in the step B,
when the selected second terminal and the first terminal are positioned in the same local area network;
the router returns the equipment information of the second terminal to the first terminal, and the first terminal sends an authorization request for accessing the wireless network to the second terminal according to the equipment information and acquires the authorization information returned by the second terminal.
5. The wireless network connection method according to claim 1 or 4, wherein in the step B,
when the selected second terminal and the first terminal are located in different local area networks;
the router sends an authorization request for accessing a wireless network to the second terminal through a transit server, and the second terminal returns authorization information to the first terminal through the transit server and the router in sequence.
6. The wireless network connection method according to claim 1, wherein the device information includes a device name of the second terminal, and a MAC address; the authorization information includes a verification code matched with verification data preset in the router.
7. A wireless networking system, comprising: the system comprises a first terminal, a second terminal and a router, wherein the first terminal is provided with an authorization request module, the router is provided with an authorization acquisition module, and the first terminal and the second terminal are provided with communication connection modules;
the authorization request module acquires the service set identifier of the router and sends an equipment information acquisition request of the second terminal to the router, and the authorization acquisition module receives the equipment information acquisition request and selects one second terminal as authorization equipment; the communication connection modules of the first terminal and the selected second terminal establish communication links with each other, and authorization information of a wireless network for accessing the router is sent to the first terminal; the authorization request module sends the authorization information to the router for verification, and the router accesses a wireless network of the router after verifying the authorization information;
in the authorization request module, the router reads the device information of the authorized second terminal correspondingly set by the router according to the device information acquisition request, and judges whether the second terminal and the first terminal are in the same local area network; if at least one of the second terminals associated with the router is in the same local area network as the first terminal, selecting the second terminal which is in the same local area network as the first terminal and has the highest priority as an authorization device according to the priority which is correspondingly set in advance; and if the number of the second terminals is one, selecting the second terminals as authorization equipment.
8. The wireless networking system of claim 7, wherein the router comprises:
the local area network judging module is used for judging whether a second terminal and the first terminal are positioned in the same local area network or not;
the first authorization information returning module is used for returning the equipment information of the second terminal to the first terminal when the second terminal and the first terminal are positioned in the same local area network, and the first terminal sends an authorization request for accessing a wireless network to the second terminal according to the equipment information and acquires the authorization information returned by the second terminal.
9. The wireless networking system of claim 7, wherein the router comprises:
the local area network judging module is used for judging whether a second terminal and the first terminal are positioned in the same local area network or not;
a second authorization information returning module, configured to return the second authorization information to the first terminal when the second terminal and the first terminal are located in different local area networks; and sending an authorization request for accessing a wireless network to the second terminal through a transit server, and returning authorization information to the first terminal by the second terminal through the transit server and the router in sequence.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510797438.1A CN105338529B (en) | 2015-11-18 | 2015-11-18 | Wireless network connection method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510797438.1A CN105338529B (en) | 2015-11-18 | 2015-11-18 | Wireless network connection method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105338529A CN105338529A (en) | 2016-02-17 |
CN105338529B true CN105338529B (en) | 2020-06-23 |
Family
ID=55288731
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510797438.1A Active CN105338529B (en) | 2015-11-18 | 2015-11-18 | Wireless network connection method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105338529B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107659932B (en) * | 2016-07-25 | 2022-05-20 | 中兴通讯股份有限公司 | Equipment access method and device |
CN106304070B (en) * | 2016-08-08 | 2020-06-16 | 北京奇虎科技有限公司 | Network automatic connection method and device |
CN108112014A (en) * | 2016-11-24 | 2018-06-01 | 中兴通讯股份有限公司 | A kind of method, control terminal and router for accessing network |
CN106851632B (en) * | 2017-01-22 | 2019-11-08 | 海尔优家智能科技(北京)有限公司 | A kind of method and device of smart machine access WLAN |
CN107396362B (en) * | 2017-08-21 | 2021-07-23 | 上海掌门科技有限公司 | Method and equipment for carrying out wireless connection pre-authorization on user equipment |
CN108848009A (en) * | 2018-05-11 | 2018-11-20 | 郑州易湃科技有限公司 | Networking management method and networking managing device based on router |
CN114640491A (en) * | 2020-12-16 | 2022-06-17 | 深圳优地科技有限公司 | Communication method and system |
CN114697294B (en) * | 2020-12-28 | 2024-03-12 | 深圳Tcl新技术有限公司 | Distribution network method, device and system and computer readable storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103068066A (en) * | 2012-12-24 | 2013-04-24 | 广东欧珀移动通信有限公司 | Intelligent mobile communication terminal and wireless network access method and system thereof |
CN104661230A (en) * | 2013-11-18 | 2015-05-27 | 中兴通讯股份有限公司 | Method and device for establishing wireless local area network based on near field communication |
CN104703252A (en) * | 2015-02-13 | 2015-06-10 | 小米科技有限责任公司 | Terminal device accessing into wireless network method and device |
CN104883685A (en) * | 2015-05-12 | 2015-09-02 | 努比亚技术有限公司 | Network access method and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103607712B (en) * | 2013-11-29 | 2018-11-02 | 深圳Tcl新技术有限公司 | The cut-in method and device of wireless network |
-
2015
- 2015-11-18 CN CN201510797438.1A patent/CN105338529B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103068066A (en) * | 2012-12-24 | 2013-04-24 | 广东欧珀移动通信有限公司 | Intelligent mobile communication terminal and wireless network access method and system thereof |
CN104661230A (en) * | 2013-11-18 | 2015-05-27 | 中兴通讯股份有限公司 | Method and device for establishing wireless local area network based on near field communication |
CN104703252A (en) * | 2015-02-13 | 2015-06-10 | 小米科技有限责任公司 | Terminal device accessing into wireless network method and device |
CN104883685A (en) * | 2015-05-12 | 2015-09-02 | 努比亚技术有限公司 | Network access method and device |
Also Published As
Publication number | Publication date |
---|---|
CN105338529A (en) | 2016-02-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105338529B (en) | Wireless network connection method and system | |
CN111865598B (en) | Identity verification method and related device for network function service | |
US11096051B2 (en) | Connection establishment method, device, and system | |
EP3557913A1 (en) | Network slice selection policy updating method and apparatus | |
US10171997B2 (en) | Method and apparatus for interconnection between terminal device and gateway device | |
US9380038B2 (en) | Bootstrap authentication framework | |
KR20160137919A (en) | Method and apparatus for providing information | |
CN113438314A (en) | Equipment control method and device, storage medium and electronic device | |
CN110535746B (en) | Virtual private network VPN sharing method and device, electronic equipment and storage medium | |
CN105450547A (en) | Method and device for allocating bandwidth on demand | |
CN113242550A (en) | Network distribution method, device, equipment and storage medium | |
KR101854389B1 (en) | System and Method for application authentication | |
US8750208B1 (en) | Processing an access request in a wireless communication system | |
CN115348614A (en) | Cross-service-platform terminal communication method and device | |
CN109741585B (en) | Communication control system and method | |
CN110401952B (en) | Authentication method and related equipment | |
CN115460053B (en) | Service calling method, device and edge computing system | |
KR101665227B1 (en) | Method and server for setting representative number | |
WO2024061059A1 (en) | Wireless network access method and apparatus, electronic device, and storage medium | |
WO2019011328A1 (en) | Wireless access method and device | |
CN111770491B (en) | Data link establishment method and device | |
CN111669751B (en) | Method and device for establishing data stream and communication system | |
US11412377B2 (en) | Method of configuring a multimedia device intended to be connected to an interconnection device | |
CN113079505B (en) | User authentication method, core network side device and computer readable storage medium | |
CN116916087A (en) | Video screen projection method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 516006 TCL technology building, No.17, Huifeng Third Road, Zhongkai high tech Zone, Huizhou City, Guangdong Province Applicant after: TCL Technology Group Co., Ltd Address before: 516006 Guangdong province Huizhou Zhongkai hi tech Development Zone No. nineteen District Applicant before: TCL RESEARCH AMERICA Inc. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |