CN105873035A - Safe AP (access point) information processing method - Google Patents

Safe AP (access point) information processing method Download PDF

Info

Publication number
CN105873035A
CN105873035A CN201610339025.3A CN201610339025A CN105873035A CN 105873035 A CN105873035 A CN 105873035A CN 201610339025 A CN201610339025 A CN 201610339025A CN 105873035 A CN105873035 A CN 105873035A
Authority
CN
China
Prior art keywords
client
focus
information
certificate server
authentication result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610339025.3A
Other languages
Chinese (zh)
Inventor
方世玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fuzhou Xiecheng Wisdom Technology Co Ltd
Original Assignee
Fuzhou Xiecheng Wisdom Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fuzhou Xiecheng Wisdom Technology Co Ltd filed Critical Fuzhou Xiecheng Wisdom Technology Co Ltd
Priority to CN201610339025.3A priority Critical patent/CN105873035A/en
Publication of CN105873035A publication Critical patent/CN105873035A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a safe AP (access point) information processing method. The method comprises steps as follows: a client scans two-dimensional codes to decode an ssid (service set identifier) and a password for accessing a hot spot, and the client prohibits other application programs from communicating through a wifi module connected with the client; the client establishes a connection with the hot spot through the wifi module connected with the client; the client sends a random number to the hot spot; the hot spot performs encryption operation on the random number with a first encryption method, and then, verification information is obtained. According to the technical scheme, unique authentication of the hot spot can be realized through an authentication server, and the situation that an AP is phished is avoided.

Description

A kind of safe AP information processing method
Technical field
The present invention relates to AP safety management technology field, particularly relate to a kind of safe AP information processing side Method.
Background technology
AP (wireless access points (WirelessAccessPoint)), i.e. wifi access point.Existing Wifi becomes more and more popular, everybody all with, a device that can provide wifi signal is exactly focus, greatly Family can be attached after searching focus with mobile phone or notebook, and it is all according to ssid that existing focus connects Be attached with password, as long as and near the focus of the most identical ssid and password occurs in, Just can connect, so facilitate everybody connection.Such as the focus of existing bus, user takes Bus or i.e. can connect bus focus around bus.But have a problem that, as Fruit is that illegal ssid becomes with cryptographic camouflage and bus wifi, and it is non-that such user just can connect this The focus of method, will result in focus and " goes fishing ", and the most illegal focus pretends to be legal focus.This focus is such as Fruit is to have information interception function, then user is during normal online, accidentally it is possible to cause The leakage of information, such as bank card information, consequently, it is possible to cause serious safety issue.
Summary of the invention
For this reason, it may be necessary to provide a kind of safe AP information processing method, solve spoofed the asking of existing focus Topic.
For achieving the above object, inventor provide a kind of safe AP information processing method, be applied to visitor Between family end, focus and certificate server, focus has unique first encryption method, and certificate server is deposited There is the first decryption method corresponding with the first encryption method, comprise the steps:
The deciphering of client scan Quick Response Code obtains ssid and the password of focus;
Client forbids that other application programs communicate by being attached thereto wifi module;
Client, according to the ssid obtained and password, is set up even to focus by the wifi module being attached thereto Connect;
Client sends and counts to focus at random;
Focus uses the first encryption method to be verified information after random number is encrypted computing;
Focus replys checking information to client;
Client sends focus identification information, checking information and counts to certificate server at random;
Certificate server obtains first decryption method according to focus identification information;
After certificate server uses first decryption method to be decrypted checking information and compare with random number Relatively obtain authentication result;
Certificate server replys authentication result to client;
Client judges whether authentication result is passed through;
If passed through, then other application programs are allowed to communicate by being attached thereto wifi module;
If do not passed through, then disconnect the connection between focus.
Further, having unique second encryption method between certificate server, client has and second The second decryption method that encryption method is corresponding, wherein:
When client sends authentication information to certificate server, client sends client identification information to recognizing Card server;
After certificate server obtains authentication result, obtain the second encryption method according to client identification information, Using the second encryption method to be encrypted authentication result and random number, then certificate server replys encryption After authentication result to client;
Client judges, when whether authentication result is passed through, to enter authentication result initially with the second decryption method Row deciphering, it is judged that random number is the most correct and whether authentication result is passed through;
If random number is correct and authentication result is passed through, then allow other application programs by being attached thereto wifi Module communicates;
Otherwise, then the connection between focus is disconnected.
Further, client sends and the information of reception certificate server includes: client passes through mobile phone Radio-frequency module sends and receives certificate server information.
Further, before setting up connection to focus, further comprise the steps of:
Client judges around whether there is the focus that two or more ssid information is identical with mac information, as Fruit has, then point out this focus.
Further, also comprise the steps: to detect focus signal intensity, be less than at focus signal intensity After preset value, disconnect the connection with focus and delete hot information.
Being different from prior art, technique scheme passes through certificate server, it is possible to achieve focus unique Property certification, it is to avoid the situation that AP is gone fishing occurs.
Accompanying drawing explanation
Fig. 1 is the system architecture schematic diagram of the present invention.
Detailed description of the invention
By describing the technology contents of technical scheme, structural feature in detail, being realized purpose and effect, below It is explained in detail in conjunction with specific embodiments.
Refer to shown in Fig. 1, present embodiments provide a kind of safe AP information processing method, Ke Yiying In the system 100 of Fig. 1, being applied between client, focus and certificate server, client is permissible It is mobile phone 101 or notebook client.Focus 102 has unique first encryption method, is uniquely Different from other focuses, uniqueness association can be carried out by the identification information of focus.Certificate server 103 have the first decryption method corresponding with the first encryption method.
This method comprises the steps: that client is passed through photographic head scanning Quick Response Code deciphering and obtained the ssid of focus With password, i.e. ssid and password are encryptions, decipherment algorithm is deposited on the client.This Quick Response Code is permissible It is pasted onto the doorway of the trade company having this focus, so wants to forge the user of illegal focus relatively Difficulty knows ssid and password, and user, without being manually entered these information, quickly connects after convenience.Visitor Family end forbids that other application programs communicate by being attached thereto wifi module;Client is typically mounted at In operating system, operating system having other application programs, operating system connects wifi module, should Can be communicated with external program by wifi module by program.Client forbids that other application programs lead to Cross wifi module communication and have multiple implementation, can be by intercepting the communication of other application programs and by number Discard according to bag, or an invalid route is set, thus by all of application program all by this road By forwarding, the communication of these application programs i.e. can be forbidden.
Client, according to the ssid obtained and password, is set up even to focus by the wifi module being attached thereto Connect.
Client sends and counts to focus at random;Client can generate a random number, this random number There is various ways.Focus uses the first encryption method to be verified after random number is encrypted computing Information;Checking information is i.e. the random number after encryption.
Focus replys checking information to client;Client send focus identification information, checking information and with Certificate server counted to by machine.Focus identification information can be mac address information or other information of focus, If other information, focus replys checking information to client when, focus can be sent together by focus Identification information is to client.
Certificate server obtains first decryption method according to focus identification information;Certificate server uses first After checking information is decrypted by decryption method and compare with random number and obtain authentication result;Certification takes Business device replys authentication result to client;Client judges whether authentication result is passed through.
If passed through, then other application programs are allowed to communicate by being attached thereto wifi module;If Do not pass through, then disconnect the connection between focus.So, the focus falsely used owing to not knowing encryption method, Then random number can not be encrypted and obtain correct checking information, natural nothing on certificate server Method certification is passed through.Then client just can disconnect and the connection of the focus falsely used, thus avoids illegal focus Connection.
Focus in order to avoid falsely using directly transmits legal authentication result to client, in some embodiment In, there is unique second encryption method between certificate server, client has and the second encryption method pair The second decryption method answered, wherein: when client sends authentication information to certificate server, client is sent out Send client identification information to certificate server;After certificate server obtains authentication result, according to client Identification information obtains the second encryption method, uses the second encryption method to add authentication result and random number Close, the authentication result after then certificate server replys encryption is to client;Client judges authentication result When whether passing through, initially with the second decryption method, authentication result is decrypted, it is judged that whether random number Whether correct and authentication result is passed through;If random number is correct and authentication result is passed through, then other are allowed to answer Communicate by being attached thereto wifi module by program;Otherwise, then the connection between focus is disconnected. So, authentication result is also the data of encryption, if the focus falsely used at will sends other legal recognizing Card result, then do not encrypt through the second encryption method due to this authentication result, then cannot decipher To correct random number and authentication result.Thus avoiding the focus falsely used, arbitrarily send one other are legal Authentication result to client, and cause the problem that client connects.
Certainly, as long as client is not by being the wifi module acquisition that is authenticated result, it is possible to significantly Improve the correctness of authentication result, as mobile phone radio frequency module (2G, 3G, 4G communication module can be passed through Deng), client sends and receives the information of certificate server and includes: client is sent out by mobile phone radio frequency module Send and receive certificate server information.Wifi pattern when so the focus owing to falsely using is carried out, and mobile phone is penetrated Frequency module cannot be falsely used, then client is legal recognizing from the authentication result that mobile phone radio frequency module gets Card result.
Many times, the focus falsely used and legal focus are in a place, for this illegal feelings Condition, needs to remind in time user.Then before this method starts, further comprise the steps of: client and judge around Whether exist two or more ssid (abbreviation of Service Set Identifier, service set) information and Mac (Media Access Control, media interviews control, and can be obtained by the beacon frame of scan hot spot) The focus that information is identical, if it has, then point out this focus.Prompting can be by dialog box or highlighted aobvious The mode shown is carried out, and user one sees such situation, will vigilance relatively when of connection.
In order to avoid connecting illegal focus elsewhere, present invention additionally comprises following steps: detection Focus signal intensity, after focus signal intensity is less than preset value, disconnects the connection with focus and deletes heat Dot information.After deleting hot information, the equipment installing client just cannot connect this hot information automatically, Thus ensure safety.
Although being described the various embodiments described above, but those skilled in the art once learn Basic creative concept, then can make other change and amendment to these embodiments, so above institute Stating only embodiments of the invention, not thereby limit the scope of patent protection of the present invention, every utilization is originally Equivalent structure or equivalence flow process that description of the invention and accompanying drawing content are made convert, or directly or indirectly use In the technical field that other are relevant, within being the most in like manner included in the scope of patent protection of the present invention.

Claims (5)

1. an AP information processing method for safety, is applied between client, focus and certificate server, Focus has unique first encryption method, and certificate server has first corresponding with the first encryption method Decryption method, it is characterised in that comprise the steps:
The deciphering of client scan Quick Response Code obtains ssid and the password of focus;
Client forbids that other application programs communicate by being attached thereto wifi module;
Client, according to the ssid obtained and password, is set up even to focus by the wifi module being attached thereto Connect;
Client sends and counts to focus at random;
Focus uses the first encryption method to be verified information after random number is encrypted computing;
Focus replys checking information to client;
Client sends focus identification information, checking information and counts to certificate server at random;
Certificate server obtains first decryption method according to focus identification information;
After certificate server uses first decryption method to be decrypted checking information and compare with random number Relatively obtain authentication result;
Certificate server replys authentication result to client;
Client judges whether authentication result is passed through;
If passed through, then other application programs are allowed to communicate by being attached thereto wifi module;
If do not passed through, then disconnect the connection between focus.
A kind of safe AP information processing method the most according to claim 1, it is characterised in that Having unique second encryption method between certificate server, client has corresponding with the second encryption method Second decryption method, wherein:
When client sends authentication information to certificate server, client sends client identification information to recognizing Card server;
After certificate server obtains authentication result, obtain the second encryption method according to client identification information, Using the second encryption method to be encrypted authentication result and random number, then certificate server replys encryption After authentication result to client;
Client judges, when whether authentication result is passed through, to enter authentication result initially with the second decryption method Row deciphering, it is judged that random number is the most correct and whether authentication result is passed through;
If random number is correct and authentication result is passed through, then allow other application programs by being attached thereto wifi Module communicates;
Otherwise, then the connection between focus is disconnected.
A kind of safe AP information processing method the most according to claim 2, it is characterised in that Client send and receive certificate server information include: client by mobile phone radio frequency module send and Receive certificate server information.
A kind of safe AP information processing method the most according to claim 1, it is characterised in that Before setting up connection to focus, further comprise the steps of:
Client judges around whether there is the focus that two or more ssid information is identical with mac information, as Fruit has, then point out this focus.
A kind of safe AP information processing method the most according to claim 1, it is characterised in that Also comprise the steps: to detect focus signal intensity, after focus signal intensity is less than preset value, disconnect Connection with focus also deletes hot information.
CN201610339025.3A 2016-05-19 2016-05-19 Safe AP (access point) information processing method Pending CN105873035A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610339025.3A CN105873035A (en) 2016-05-19 2016-05-19 Safe AP (access point) information processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610339025.3A CN105873035A (en) 2016-05-19 2016-05-19 Safe AP (access point) information processing method

Publications (1)

Publication Number Publication Date
CN105873035A true CN105873035A (en) 2016-08-17

Family

ID=56635448

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610339025.3A Pending CN105873035A (en) 2016-05-19 2016-05-19 Safe AP (access point) information processing method

Country Status (1)

Country Link
CN (1) CN105873035A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106973425A (en) * 2017-04-06 2017-07-21 上海掌门科技有限公司 A kind of method and apparatus for connecting WAP
CN107635231A (en) * 2017-09-12 2018-01-26 中国联合网络通信集团有限公司 Control method, device and the mobile terminal of focus WIFI switches
CN108834147A (en) * 2018-08-21 2018-11-16 中国平安人寿保险股份有限公司 Examine WiFi cipher safety method, apparatus, computer equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102547701A (en) * 2010-12-24 2012-07-04 中国移动通信集团公司 Authentication method and wireless access point as well as authentication server
CN104144163A (en) * 2014-07-24 2014-11-12 腾讯科技(深圳)有限公司 Identity verification method, device and system
CN105188055A (en) * 2015-08-14 2015-12-23 中国联合网络通信集团有限公司 Wireless network access method, wireless access point and server
CN105554747A (en) * 2016-01-29 2016-05-04 腾讯科技(深圳)有限公司 Wireless network connecting method, device and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102547701A (en) * 2010-12-24 2012-07-04 中国移动通信集团公司 Authentication method and wireless access point as well as authentication server
CN104144163A (en) * 2014-07-24 2014-11-12 腾讯科技(深圳)有限公司 Identity verification method, device and system
CN105188055A (en) * 2015-08-14 2015-12-23 中国联合网络通信集团有限公司 Wireless network access method, wireless access point and server
CN105554747A (en) * 2016-01-29 2016-05-04 腾讯科技(深圳)有限公司 Wireless network connecting method, device and system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106973425A (en) * 2017-04-06 2017-07-21 上海掌门科技有限公司 A kind of method and apparatus for connecting WAP
WO2018184410A1 (en) * 2017-04-06 2018-10-11 上海掌门科技有限公司 Method and apparatus for connecting to wireless access point
CN107635231A (en) * 2017-09-12 2018-01-26 中国联合网络通信集团有限公司 Control method, device and the mobile terminal of focus WIFI switches
CN108834147A (en) * 2018-08-21 2018-11-16 中国平安人寿保险股份有限公司 Examine WiFi cipher safety method, apparatus, computer equipment and storage medium
CN108834147B (en) * 2018-08-21 2022-10-21 中国平安人寿保险股份有限公司 WiFi password security checking method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN106559783B (en) Authentication method, device and system for WIFI network
CN108848112B (en) Cut-in method, equipment and the system of user equipment (UE)
CN103139768B (en) Authentication method in fusing wireless network and authentication device
JP2018088292A (en) System and method for secure transaction process by mobile equipment
US11381977B2 (en) System and method for decrypting communication exchanged on a wireless local area network
CN105792194B (en) Authentication method, authentication device, the network equipment, the Verification System of base station legitimacy
DK2924944T3 (en) Presence authentication
CN106488453A (en) A kind of method and system of portal certification
CN103945374A (en) Method of mobile terminal equipment and user authentication based on PKI technology
CN106559785B (en) Authentication method, device and system, access device and terminal
CN104284331A (en) Method and system for connecting with portable WLAN hotspot
CN105873035A (en) Safe AP (access point) information processing method
CN103139750A (en) Processing system, processing method, identification server and access controller for user logoff
CN102970680A (en) Method and device for network switching
CN105873034A (en) Safe hot spot information processing method
CN110312253B (en) Network access method, device and system
CN108123918A (en) A kind of account authentication login method and device
CN106028327A (en) Method for realizing hotspot security through authentication server
CN106028328A (en) NFC-based hotspot authentication method
CN106101058A (en) A kind of hot information processing method based on Quick Response Code
CN105873036A (en) Safe AP (access point) information processing method
CN106412904B (en) Method and system for preventing counterfeit user authentication authority
CN107360573B (en) Terminal access method and device
CN106878989A (en) A kind of connection control method and device
CN106453199A (en) Unified authentication method and system based on subscriber identity module card

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160817