CN106385684B - Method and device for sharing wireless network and method and device for accessing wireless network - Google Patents

Method and device for sharing wireless network and method and device for accessing wireless network Download PDF

Info

Publication number
CN106385684B
CN106385684B CN201610812193.XA CN201610812193A CN106385684B CN 106385684 B CN106385684 B CN 106385684B CN 201610812193 A CN201610812193 A CN 201610812193A CN 106385684 B CN106385684 B CN 106385684B
Authority
CN
China
Prior art keywords
wireless network
character string
access
name
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610812193.XA
Other languages
Chinese (zh)
Other versions
CN106385684A (en
Inventor
王俊
刘春华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Electronics China R&D Center
Samsung Electronics Co Ltd
Original Assignee
Samsung Electronics China R&D Center
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics China R&D Center, Samsung Electronics Co Ltd filed Critical Samsung Electronics China R&D Center
Priority to CN201610812193.XA priority Critical patent/CN106385684B/en
Publication of CN106385684A publication Critical patent/CN106385684A/en
Application granted granted Critical
Publication of CN106385684B publication Critical patent/CN106385684B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

The application discloses a method and a device for sharing a wireless network and accessing the wireless network. One embodiment of the method comprises: acquiring the name and access verification information of a wireless network to be shared; encrypting the access verification information to obtain a ciphertext character string; obtaining an access code of the wireless network to be shared based on the name and the ciphertext character string; and sending the access code to a terminal to be accessed so as to share the wireless network to be shared with the terminal to be accessed. The implementation method avoids the tedious steps that the user needs to input the verification information when the terminal is accessed into the wireless network, and realizes the rapid and convenient access to the wireless network.

Description

Method and device for sharing wireless network and method and device for accessing wireless network
Technical Field
The present application relates to the field of internet technologies, and in particular, to a method and an apparatus for sharing and accessing a wireless network.
Background
The wireless network can cover the range which is difficult to be related by the wireless network, and simultaneously can meet the requirement of roaming access of mobile communication. At present, wireless networks are used as a preferred internet connection mode in many industries, and with the continuous popularization of intelligent devices, the number of intelligent devices accessing the wireless networks is also increasing, and how to rapidly access various intelligent devices to the wireless networks becomes an important problem facing the current.
At present, when the intelligent device is accessed to a wireless network, under a common condition, a wireless network signal needs to be searched first, then an adaptive password is input, and the intelligent device waits for being accessed to the network, so that the time consumption is long.
Disclosure of Invention
The present application is directed to a method and apparatus for sharing a wireless network and accessing the wireless network, so as to solve the technical problems mentioned in the above background.
In a first aspect, the present application provides a method for sharing a wireless network, the method comprising: acquiring the name and access verification information of a wireless network to be shared; encrypting the access verification information to obtain a ciphertext character string; obtaining an access code of the wireless network to be shared based on the name and the ciphertext character string; and sending the access code to a terminal to be accessed so as to share the wireless network to be shared with the terminal to be accessed.
In some embodiments, the encrypting the name and the access authentication information to obtain a ciphertext string includes: calling a key generation function to generate a key by adopting a preset encryption type; and calling an encryption function to encrypt the access verification information by adopting the key to obtain a ciphertext character string.
In some embodiments, the obtaining the access code of the wireless network to be shared based on the name and the ciphertext character string includes: and arranging the secret key, the name and the ciphertext character string in a preset arrangement sequence to obtain the access code.
In some embodiments, the obtaining the access code of the wireless network to be shared based on the name and the ciphertext character string includes: adding a preset key identifier in front of the key to obtain a key with the identifier; adding a preset ciphertext character string identifier in front of the ciphertext character string to obtain the ciphertext character string with the identifier; adding a preset name identifier in front of the name of the wireless network to be shared to obtain the name of the added identifier; combining the key with the added identifier, the ciphertext character string with the added identifier and the name of the added identifier to obtain an access code main body; and adding a preset check mark in front of the access code main body, and adding a preset finishing mark behind the access code main body to obtain the access code.
In some embodiments, the sending the access code to the terminal to be accessed includes: sending the access code to the terminal to be accessed through at least one of the following data transmission modes: near field communication, infrared, bluetooth.
In some embodiments, the method further comprises: displaying a sending state for sending the access code, wherein the sending state comprises: successful transmission, failed transmission, or in transmission.
In a second aspect, the present application provides a method for accessing a wireless network, the method comprising: acquiring an access code of a wireless network to be accessed, wherein the access code is obtained by encrypting a ciphertext character string obtained after access verification information of the wireless network to be accessed based on the name of the wireless network to be accessed; analyzing the access code to obtain the name and the ciphertext character string; decrypting the ciphertext character string to obtain the access verification information; and accessing the wireless network to be accessed based on the name and the access verification information.
In some embodiments, the access code further comprises a key employed to encrypt the access verification information; and analyzing the access code to obtain the name and the ciphertext character string, including: and sequentially reading the access codes, and determining the name, the ciphertext character string and the secret key based on a preset arrangement sequence.
In some embodiments, the parsing the access code to obtain the name and the ciphertext character string further includes: responding to the access code comprising a check identifier and an ending identifier, and detecting whether the access code comprises a secret key identifier, a ciphertext character string identifier and a name identifier; and in response to the access code comprising the key identifier, the ciphertext character string identifier and the name identifier, extracting the character string indicated by the key identifier as the key, extracting the character string indicated by the ciphertext character string identifier as the ciphertext character string, and extracting the character string indicated by the name identifier as the name of the wireless network to be accessed.
In some embodiments, the decrypting the ciphertext character string to obtain the access verification information includes: and calling a decryption function by adopting a preset decryption type to decrypt the ciphertext character string by adopting the secret key to obtain the access verification information.
In some embodiments, before the accessing the wireless network to be accessed based on the name and the authentication information, the method further comprises: detecting the state of a switch accessed to a wireless network; turning on a switch accessing the wireless network in response to detecting that the state of the switch accessing the wireless network is off; detecting whether the wireless network is accessed currently or not in response to the detection that the state of the switch for accessing the wireless network is on; responding to the current accessed wireless network, and displaying a wireless network switching inquiry message; and responding to the received confirmation switching wireless network message sent by the user, and disconnecting the connection of the accessed wireless network.
In some embodiments, the method further comprises: displaying an access state of accessing the wireless network to be accessed, wherein the access state comprises: access success, access failure, or in-access.
In a third aspect, the present application provides an apparatus for sharing a wireless network, the apparatus comprising: the first acquisition unit is used for acquiring the name and the access verification information of the wireless network to be shared; the encryption unit is used for encrypting the access verification information to obtain a ciphertext character string; a determining unit, configured to obtain an access code of the wireless network to be shared based on the name and the ciphertext character string; and the sending unit is used for sending the access code to a terminal to be accessed so as to share the wireless network to be shared with the terminal to be accessed.
In some embodiments, the encryption unit comprises: the generation module is used for calling a key generation function to generate a key by adopting a preset encryption type; and the encryption module is used for calling an encryption function to encrypt the access verification information by adopting the key to obtain a ciphertext character string.
In some embodiments, the determining unit is further configured to: and arranging the secret key, the name and the ciphertext character string in a preset arrangement sequence to obtain the access code.
In some embodiments, the determining unit is further configured to: adding a preset key identifier in front of the key to obtain a key with the identifier; adding a preset ciphertext character string identifier in front of the ciphertext character string to obtain the ciphertext character string with the identifier; adding a preset name identifier in front of the name of the wireless network to be shared to obtain the name of the added identifier; combining the key with the added identifier, the ciphertext character string with the added identifier and the name of the added identifier to obtain an access code main body; and adding a preset check mark in front of the access code main body, and adding a preset finishing mark behind the access code main body to obtain the access code.
In some embodiments, the sending unit is further configured to: sending the access code to the terminal to be accessed through at least one of the following data transmission modes: near field communication, infrared, bluetooth.
In some embodiments, the apparatus further comprises: a first display unit, configured to display a sending status of sending the access code, where the sending status includes: successful transmission, failed transmission, or in transmission.
In a fourth aspect, the present application provides an apparatus for accessing a wireless network, the apparatus comprising: a second obtaining unit, configured to obtain an access code of a wireless network to be accessed, where the access code is obtained by encrypting, based on a name of the wireless network to be accessed, an access verification information of the wireless network to be accessed to obtain a ciphertext character string; the analysis unit is used for analyzing the access code to obtain the name and the ciphertext character string; the decryption unit is used for decrypting the ciphertext character string to obtain the access verification information; and the access unit is used for accessing the wireless network to be accessed based on the name and the access verification information.
In some embodiments, the access code further comprises a key employed to encrypt the access verification information; and the parsing unit is further configured to: and sequentially reading the access codes, and determining the name, the ciphertext character string and the secret key based on a preset arrangement sequence.
In some embodiments, the parsing unit is further configured to: responding to the access code comprising a check identifier and an ending identifier, and detecting whether the access code comprises a secret key identifier, a ciphertext character string identifier and a name identifier; and in response to the access code comprising the key identifier, the ciphertext character string identifier and the name identifier, extracting the character string indicated by the key identifier as the key, extracting the character string indicated by the ciphertext character string identifier as the ciphertext character string, and extracting the character string indicated by the name identifier as the name of the wireless network to be accessed.
In some embodiments, the decryption unit is further to: and calling a decryption function by adopting a preset decryption type to decrypt the ciphertext character string by adopting the secret key to obtain the access verification information.
In some embodiments, the apparatus further comprises: the detection unit is used for detecting the state of a switch accessed to the wireless network before the access unit accesses the wireless network to be accessed based on the name and the verification information; turning on a switch accessing the wireless network in response to detecting that the state of the switch accessing the wireless network is off; detecting whether the wireless network is accessed currently or not in response to the detection that the state of the switch for accessing the wireless network is on; responding to the current accessed wireless network, and displaying a wireless network switching inquiry message; and responding to the received confirmation switching wireless network message sent by the user, and disconnecting the connection of the accessed wireless network.
In some embodiments, the apparatus further comprises: a second display unit, configured to display an access status of accessing the wireless network to be accessed, where the access status includes: access success, access failure, or in-access.
According to the wireless network sharing method and the wireless network accessing device, the access verification information of the wireless network to be shared is encrypted, the name of the wireless network to be shared is combined, the access code of the wireless network to be shared is generated, and then the access code is shared to the terminal to be accessed. The method comprises the steps that after an access terminal acquires an access code of a wireless network to be accessed, the access code is analyzed to obtain encrypted access verification information and an encrypted name, the access verification information is obtained through decryption, and finally the wireless network to be accessed is accessed based on the name and the access verification information of the wireless network to be accessed, so that the tedious step that a user needs to input verification information when the terminal is accessed to the wireless network is avoided, and the wireless network can be accessed quickly and conveniently.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 is an exemplary system architecture diagram in which the present application may be applied;
FIG. 2 is a flow diagram of one embodiment of a method for sharing a wireless network according to the present application;
FIG. 3 is a schematic diagram of one application scenario of a method for sharing a wireless network according to the present application;
FIG. 4 is a flow diagram of yet another embodiment of a method for accessing a wireless network according to the present application;
FIG. 5 is a block diagram illustrating one embodiment of an apparatus for sharing a wireless network according to the present application;
FIG. 6 is a schematic block diagram illustrating one embodiment of an apparatus for accessing a wireless network according to the present application;
fig. 7 is a schematic structural diagram of a computer system suitable for implementing a terminal device according to an embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 illustrates an exemplary system architecture 100 to which embodiments of the present methods for sharing a wireless network, apparatuses for sharing a wireless network, methods for accessing a wireless network, or apparatuses for accessing a wireless network may be applied.
As shown in fig. 1, the system architecture 100 may include terminal devices 101 and 102 and terminal devices 103 and 104 to be accessed, and the terminal devices 101 and 102 and the terminal devices 103 and 104 to be accessed interact with each other through wireless communication to receive or send messages and the like.
The terminal devices 101 and 102 and the terminal devices 103 and 104 to be accessed may be various electronic devices having display screens and supporting access to a wireless network, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (Moving Picture Experts Group Audio Layer III, motion video Experts compression standard Audio Layer 3), MP4 players (Moving Picture Experts Group Audio Layer IV, motion video Experts compression standard Audio Layer 4), laptop portable computers, desktop computers, and the like.
It should be noted that the method for sharing a wireless network provided in the embodiment of the present application is generally performed by the terminal devices 101 and 102, and accordingly, the apparatus for sharing a wireless network is generally disposed in the terminal devices 101 and 102; the method for accessing the wireless network provided by the embodiment of the present application is generally performed by the terminal devices 103 and 104 to be accessed, and accordingly, the apparatus for accessing the wireless network is generally disposed in the terminal devices 103 and 104 to be accessed.
It should be understood that the number of terminal devices and terminal devices to be accessed in fig. 1 is merely illustrative. There may be any number of terminal devices and terminal devices to be accessed, as desired for implementation.
With continued reference to fig. 2, a flow 200 of one embodiment of a method for sharing a wireless network in accordance with the present application is shown. The method for sharing the wireless network of the embodiment comprises the following steps:
step 201, obtaining the name and access verification information of the wireless network to be shared.
In this embodiment, an electronic device (for example, the terminal device shown in fig. 1) on which the method for sharing a wireless network operates may acquire the name and the access authentication information of the wireless network to be shared in various manners, for example, from a file pre-stored in the terminal device, or from another device through a wired or wireless connection manner. The name of the wireless network to be shared, that is, the SSID (Service Set Identifier) of the wireless network, is used to identify the wireless network to be shared, and may be a wireless network defined by a user or may be automatically generated when the wireless network is configured. The access authentication information is used for authenticating when accessing the wireless network to be shared, and may be a character string composed of numbers or letters or symbols or other implementable forms.
In some optional implementation manners of this embodiment, after acquiring the name and the access verification information of the wireless network to be shared, the terminal device may attempt to access the wireless network to be shared, so as to verify whether the access verification information is correct.
Step 202, encrypting the access verification information to obtain a ciphertext character string.
In this embodiment, various encryption algorithms may be used to encrypt the access authentication information, such as a symmetric encryption algorithm, an asymmetric encryption algorithm, and the like. After the access verification information is encrypted, a corresponding ciphertext character string can be obtained.
In some optional implementations of the present embodiment, the step 202 may be implemented by the following sub-steps not shown in fig. 2: calling a key generation function to generate a key by adopting a preset encryption type; and calling an encryption function to encrypt the access verification information by using the generated key to obtain a ciphertext character string.
In this implementation manner, a symmetric encryption algorithm may be used to encrypt the access authentication information, and in the encryption process, a key generation function is first called to generate a key, and then an encryption function is called to encrypt the key by using the generated key, so as to obtain a ciphertext character string.
And step 203, obtaining an access code of the wireless network to be shared based on the name and the ciphertext character string.
In this embodiment, the name and the ciphertext character string of the wireless network to be shared may be combined or added to obtain the access code of the wireless network to be shared. The access code may be a data frame with a fixed format, for example, the access code may have a fixed length, the parts constituting the access code have a fixed arrangement order, and the like.
In some optional implementations of this embodiment, the step 203 may be implemented by the following sub-steps not shown in fig. 2: and arranging the secret key, the name and the ciphertext character string in a preset arrangement sequence to obtain the access code.
In this implementation, the order of arrangement of the parts in the access code may be set in advance, for example, the parts are arranged in a manner that the name is first, the key is second, and the ciphertext character string is third. In this way, after the access terminal acquires the access code, the access terminal can read the access code in sequence, so as to determine each part in the access code.
In some optional implementation manners of this embodiment, when determining the access code, the data length of each portion or the data composition length of each portion may be determined after obtaining the key, the name, and the ciphertext character string. After the data length of each part is determined, the length values can be added into the access code together, so that the terminal equipment to be accessed can quickly determine the size and the position of the key, the name and the ciphertext character string after receiving the access code. When the data composition length of each part is preset, the terminal equipment to be accessed sequentially reads after receiving the access code, and determines the data of each part by combining the preset arrangement sequence.
In some optional implementations of this embodiment, the step 203 may also be implemented by the following sub-steps not shown in fig. 2:
adding a preset key identifier in front of the key to obtain the identifier-added key; adding a preset ciphertext character string identifier in front of the ciphertext character string to obtain the ciphertext character string added with the identifier; adding a preset name identifier before the name of the wireless network to be shared to obtain the name of the added identifier; combining the key with the added identifier, the ciphertext character string with the added identifier and the name of the added identifier to obtain an access code main body; and adding a preset check mark in front of the access code main body, and adding a preset finishing mark behind the access code main body to obtain the access code.
In this implementation manner, a preset key identifier, a preset ciphertext character string identifier and a preset name identifier may be added before the key, the ciphertext character string and the name of the wireless network to be shared, and then the key and the key identifier are bound, the ciphertext character string and the ciphertext character string identifier are bound, the name and the name identifier are bound, the bound three parts are combined, and the combined data is used as an access code main body; a preset check identifier can be added in front of the access code main body, so that after the access code is acquired by the terminal to be accessed, the received data is determined to be the access code of the wireless network to be shared according to the check identifier; the preset end mark can be added behind the access code main body, so that the terminal to be accessed determines whether the access code is complete or not according to the end mark after determining that the received data is the access code, and the phenomenon that the data transmission is interrupted due to disconnection of a data transmission link or other reasons, so that the incomplete access code is received, and the wireless network to be shared cannot be accessed is avoided.
Exemplarily, the Encryption type may be AES (Advanced Encryption Standard), and the key generation function is invoked to generate the symmetric key K; setting the check mark as M by hard coding, setting the SSID of the wireless network to be shared as S, and setting the ending mark as E; calling an encryption function, encrypting the password N of the wireless network to be shared by using the key K, and generating a ciphertext character string N1; the file of the access code consists of M + K + S + N1+ E.
And step 204, sending the access code to the terminal to be accessed so as to share the wireless network to be shared with the terminal to be accessed.
In this embodiment, the terminal device executing the method for sharing the wireless network may send the obtained access code to the terminal to be accessed through various communication modes, so as to share the wireless network with the terminal to be accessed.
In some optional implementation manners of this embodiment, the terminal may send the access code to the terminal to be accessed through near field communication or an infrared or bluetooth manner.
When the terminal equipment and the terminal equipment to be accessed have the near field communication function, the terminal equipment and the terminal equipment to be accessed can transmit the access code through near field communication. It will be appreciated that the access code may also be transmitted by other means of data transmission, such as infrared, bluetooth, radio frequency identification technology or other implementable means.
By the data transmission mode, the security and the rapidity of the wireless network login information in the transmission process can be effectively protected, and the monitoring and tampering in the data transmission process are avoided; and because the user does not need to manually search the wireless signal and input the password, the time for accessing the wireless network is shortened, and meanwhile, the user can set the wireless network to be hidden, so that the possibility that the wireless network is searched by a malicious attacker is reduced.
In some optional implementations of this embodiment, the method further includes the following steps not shown in fig. 2: and displaying the transmission state of the transmission access code.
In this implementation, the sending state includes: successful transmission, failed transmission, or in transmission. When the terminal equipment sends the access code to the terminal equipment to be accessed, the sending state can be displayed on a display screen of the terminal equipment in the sending process of the access code.
With continued reference to fig. 3, fig. 3 is a schematic diagram of an application scenario of the method for sharing a wireless network according to the present embodiment. In the application scenario of fig. 3, the user selects to turn on an NFC (near field communication) function through the smartphone 31, and selects one wireless network as the wireless network to be shared. Each wireless network includes a name and an access password (only the name of the wireless network is displayed on the screen of the smartphone 31). After selecting a wireless network to be shared, the smartphone 31 automatically generates an access code of the selected wireless network. Then, the smartphone 31 is in near field communication with the smartphone 32 that wants to access the wireless network, wherein the smartphone 32 also turns on the NFC function and sends the access code to the smartphone 32. After the transmission is completed, the smartphone 31 displays a transmission success interface.
The application scenario shown in fig. 3 may be applied to sharing of a home wireless network, and when a visitor visits, the visitor may use a smart phone or a tablet computer or other electronic devices to perform data transmission with an electronic device of a host, so that the visitor may quickly access the home wireless network.
Of course, the method for sharing the wireless network of the embodiment can also be applied to smart homes, home medical care and public places. For example, a user can interact with each device in an intelligent home through the portable terminal device, so that each device can be quickly accessed to a small internet of things formed by a home wireless network; in public places (hotels, restaurants and large conference centers), names and passwords of wireless networks can be encrypted and set into electronic chips, two-dimensional codes or other devices, and users can intervene in the wireless networks by scanning or contacting the wireless networks through intelligent equipment.
The method for sharing the wireless network provided by the embodiment of the application encrypts the access verification information of the wireless network to be shared, generates the access code of the wireless network to be shared by combining the name of the wireless network to be shared, and then shares the access code to the terminal to be accessed. The method avoids the complex steps that the user needs to input the verification information when the terminal is accessed into the wireless network, and realizes the rapid and convenient access to the wireless network.
Fig. 4 shows a flowchart 400 of yet another embodiment of a method for accessing a wireless network according to the present application. The method for accessing the wireless network of the embodiment comprises the following steps:
step 401, acquiring an access code of a wireless network to be accessed.
In this embodiment, an electronic device (for example, the to-be-accessed terminal device in fig. 1) executing the method for accessing the wireless network may acquire an access code of the to-be-accessed wireless network in various manners, for example, acquire the access code from a terminal sharing the to-be-accessed wireless network in a near field communication manner. The access code is obtained based on the name of the wireless network to be accessed and a ciphertext character string obtained by encrypting the access verification information of the wireless network to be accessed.
Step 402, analyzing the access code to obtain the name and the ciphertext character string.
After the access terminal device obtains the access code, the access code is firstly analyzed to obtain the name and the ciphertext character string corresponding to the access verification information.
In some optional implementations of this embodiment, the access code further includes a key used for encrypting the access authentication information. The step 402 may specifically implement the parsing of the access code by the following steps not shown in fig. 4: and sequentially reading the access codes, and determining the name, the ciphertext character string and the secret key based on a preset arrangement sequence.
In this implementation manner, each part in the access code may be arranged according to a preset arrangement order, and after receiving the access code, the access terminal reads data in the access code in sequence, and in combination with the preset arrangement order, may determine a name, a ciphertext character string, and a key of the wireless network to be accessed.
In some optional implementation manners of this embodiment, when parsing the access code in step 402, it may also be first detected whether the access code includes a check identifier and an end identifier. The check mark is used for representing the file attribute, after receiving the data, the terminal equipment to be accessed detects whether the check mark is included, and when the check mark exists, the received data is determined to be the access code of the wireless network to be accessed. The end identifier is used to indicate whether the access code is complete, and when the access code exists, the end identifier indicates that the access code received by the terminal to be accessed is complete.
And after the received access code is determined to comprise the two identifications, further detecting whether the access code comprises a secret key identification, a ciphertext character string identification and a name identification. The key identification is bound with the key, the ciphertext character string identification is bound with the ciphertext character string, and the name identification is bound with the name of the wireless network to be accessed. When the terminal equipment to be accessed reads the access code, which part of the access code belongs to the secret key, the ciphertext character string and the name can be quickly determined by reading the secret key identifier, the ciphertext character string identifier and the name identifier.
When the three identifiers exist, extracting the character string indicated by the key identifier as the key, extracting the character string indicated by the ciphertext character string identifier as the ciphertext character string, and extracting the character string indicated by the name identifier as the name of the wireless network to be accessed.
And step 403, decrypting the ciphertext character string to obtain access verification information.
After the access terminal obtains the name of the wireless network to be accessed, the key used for encryption and the ciphertext character string corresponding to the access verification information through analysis, the ciphertext character string is decrypted, and then the access verification information of the plaintext can be obtained.
In some optional implementation manners of this embodiment, when decrypting the ciphertext character string, a preset decryption type is used, and a decryption function is called to decrypt the ciphertext character string by using a key, so as to obtain the access verification information.
It will be appreciated that the type of decryption described above should correspond to the type of encryption employed in the encryption. For example, the AES encryption type is used for encryption, and the AES decryption type is also used for decryption.
And step 404, accessing the wireless network to be accessed based on the name and the access authentication information.
And according to the obtained name and access verification information of the wireless network to be accessed, the terminal to be accessed can be quickly accessed into the wireless network to be accessed.
In some optional implementation manners of this embodiment, before the terminal device accesses the wireless network, a state of a switch accessing the wireless network may be detected first, and when it is detected that the state of the switch accessing the wireless network is off, the switch accessing the wireless network is automatically turned on. And when the state of the switch for accessing the wireless network is detected to be open, detecting whether the wireless network is accessed currently. And when detecting that the wireless network is accessed currently, displaying a wireless network switching inquiry message on the terminal to be accessed. After the user confirms the wireless network switching, the terminal to be accessed disconnects the accessed wireless network, and automatically accesses the wireless network to be accessed.
This is particularly useful for enabling fast handover of an accessed wireless network when the wireless network is currently accessed and a terminal to be accessed is performing network data exchange or when the accessed wireless network is a paid network or an unsecured network.
In some optional implementation manners of this embodiment, the terminal device may further display an access status of accessing the wireless network to be accessed, such as access success, access failure, or access in progress.
According to the method for accessing the wireless network provided by the embodiment of the application, after the terminal to be accessed acquires the access code of the wireless network to be accessed, the access code is analyzed to obtain the encrypted access verification information and name, the access verification information is obtained by decryption, and finally the wireless network to be accessed is accessed based on the name and the access verification information of the wireless network to be accessed, so that the tedious step that a user needs to input the verification information when the terminal is accessed into the wireless network is avoided, and the wireless network can be accessed quickly and conveniently.
With further reference to fig. 5, as an implementation of the method shown in fig. 2, the present application provides an embodiment of an apparatus for sharing a wireless network, where the embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 2, and the apparatus may be applied to various electronic devices.
As shown in fig. 5, the apparatus 500 for sharing a wireless network according to this embodiment includes: a first acquisition unit 501, an encryption unit 502, a determination unit 503, and a transmission unit 504.
The first obtaining unit 501 is configured to obtain a name and access verification information of a wireless network to be shared.
The encrypting unit 502 is configured to encrypt the access authentication information acquired by the first acquiring unit 501 to obtain a ciphertext character string.
In some optional implementations of this embodiment, the encryption unit 502 may further include a generation module and an encryption module that are not shown in fig. 5.
The generation module is used for calling a key generation function to generate a key by adopting a preset encryption type.
And the encryption module is used for calling an encryption function to encrypt the access verification information by adopting the key generated by the generation module to obtain a ciphertext character string.
The determining unit 503 is configured to obtain an access code of the wireless network to be shared based on the name obtained by the first obtaining unit 501 and the ciphertext character string obtained by the encrypting unit 502.
In some optional implementations of this embodiment, the determining unit 503 may be further configured to: the key generated by the generating module, the name acquired by the first acquiring unit 501, and the ciphertext character string acquired by the encrypting module are arranged in a preset arrangement order to obtain the access code.
In some optional implementations of this embodiment, the determining unit 503 may be further configured to:
adding a preset key identifier in front of the key generated by the generation module to obtain the identifier-added key; adding a preset ciphertext character string identifier in front of a ciphertext character string obtained by an encryption module to obtain the ciphertext character string added with the identifier; adding a preset name identifier before the name of the wireless network to be shared acquired by the first acquisition unit 501 to obtain the name of the added identifier; combining the key with the added identifier, the ciphertext character string with the added identifier and the name of the added identifier to obtain an access code main body; and adding a preset check mark in front of the access code main body, and adding a preset finishing mark behind the access code main body to obtain the access code.
A sending unit 504, configured to send the access code obtained by the determining unit 503 to the terminal to be accessed, so as to share the wireless network to be shared with the terminal to be accessed.
In some optional implementations of this embodiment, the sending unit 504 may be further configured to: sending the access code to the terminal to be accessed through at least one of the following data transmission modes: near field communication, infrared, bluetooth, radio frequency identification, and other data transmission means.
In the apparatus for sharing a wireless network provided in the above embodiment of the present application, the encryption unit encrypts the access verification information of the wireless network to be shared, the determining unit generates the access code of the wireless network to be shared in combination with the name of the wireless network to be shared acquired by the first acquiring unit, and then the sending unit shares the access code with the terminal to be accessed. The method avoids the complex steps that the user needs to input the verification information when the terminal is accessed into the wireless network, and realizes the rapid and convenient access to the wireless network.
With further reference to fig. 6, as an implementation of the method shown in fig. 4, the present application provides an embodiment of an apparatus for accessing a wireless network, where the embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 4, and the apparatus may be specifically applied to various electronic devices.
As shown in fig. 6, the apparatus 600 for accessing a wireless network of the present embodiment includes: second acquisition section 601, parsing section 602, decryption section 603, and access section 604.
A second obtaining unit 601, configured to obtain an access code of a wireless network to be accessed.
The access code is obtained by encrypting the access verification information of the wireless network to be accessed based on the name of the wireless network to be accessed and a ciphertext character string.
The analyzing unit 602 is configured to analyze the access code acquired by the second acquiring unit 601 to obtain a name of the wireless network to be accessed and the ciphertext character string.
In some optional implementations of this embodiment, the access code may further include a key used for encrypting the access authentication information.
The parsing unit 602 may further be configured to: and sequentially reading the access codes, and determining the name, the ciphertext character string and the secret key based on a preset arrangement sequence.
In some optional implementations of this embodiment, the parsing unit 602 may further be configured to:
responding to the access code comprising a check identifier and an ending identifier, and detecting whether the access code comprises a secret key identifier, a ciphertext character string identifier and a name identifier;
and in response to the access code comprising a key identifier, a ciphertext character string identifier and a name identifier, extracting the character string indicated by the key identifier as a key, extracting the character string indicated by the ciphertext character string identifier as a ciphertext character string, and extracting the character string indicated by the name identifier as the name of the wireless network to be accessed.
The decryption unit 603 is configured to decrypt the ciphertext character string obtained by the parsing unit 602 to obtain access verification information of the wireless network to be accessed.
In some optional implementations of this embodiment, the decryption unit may be further configured to: and calling a decryption function by adopting a preset decryption type to decrypt the ciphertext character string by adopting the key to obtain access verification information.
The access unit 604 is configured to access the wireless network to be accessed based on the name of the wireless network to be accessed and the access authentication information.
In some optional implementation manners of this embodiment, the apparatus 600 for accessing a wireless network may further include a detection unit not shown in fig. 6, where the detection unit is configured to, before the access unit accesses the wireless network to be accessed based on the name and the authentication information of the wireless network to be accessed, perform the following steps:
detecting the state of a switch accessed to a wireless network; in response to detecting that the state of the switch accessing the wireless network is closed, the switch accessing the wireless network is opened; detecting whether the wireless network is accessed currently or not in response to detecting that the state of a switch accessing the wireless network is on; responding to the current accessed wireless network, and displaying a wireless network switching inquiry message; and responding to the received confirmation switching wireless network message sent by the user, and disconnecting the connection of the accessed wireless network.
In some optional implementations of this embodiment, the apparatus 600 for accessing a wireless network may further include a second display unit, not shown in fig. 6, for displaying an access status of accessing a wireless network to be accessed. The access state includes: access success, access failure, or in-access.
According to the device for accessing the wireless network, after the second acquisition unit acquires the access code of the wireless network to be accessed, the analysis unit analyzes the access code to obtain the encrypted access verification information and name, the decryption unit decrypts the access verification information, and finally the access unit accesses the wireless network to be accessed based on the name and the access verification information of the wireless network to be accessed, so that the tedious step that a user needs to input verification information when the terminal accesses the wireless network is avoided, and the wireless network can be accessed quickly and conveniently.
It should be understood that units 501 to 504 recited in the apparatus 500 for sharing a wireless network correspond to respective steps in the method described with reference to fig. 2, respectively; units 601 to 604 recited in the apparatus 600 for accessing a wireless network correspond to respective steps in the method described with reference to fig. 4, respectively. As such, the operations and features described above for the method for sharing a wireless network are equally applicable to the device 500 and the units included therein; the operations and features described for the method for accessing a wireless network are equally applicable to the apparatus 600 and the units included therein and will not be described in detail here. Corresponding elements of the apparatus 500 or the apparatus 600 may cooperate with elements in the terminal device to implement aspects of embodiments of the present application.
In the above-described embodiments of the present application, the first acquisition unit and the second acquisition unit are only for distinguishing two different acquisition units; the first display unit and the second display unit are only used for distinguishing two different display units. It should be understood by those skilled in the art that the first or second does not constitute a specific limitation to the acquisition unit and the display unit.
Referring now to FIG. 7, shown is a block diagram of a computer system 700 suitable for use in implementing a terminal device of an embodiment of the present application.
As shown in fig. 7, the computer system 700 includes a Central Processing Unit (CPU)701, which can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. In the RAM 703, various programs and data necessary for the operation of the system 700 are also stored. The CPU 701, the ROM 702, and the RAM 703 are connected to each other via a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
The following components are connected to the I/O interface 705: an input portion 706 including a keyboard, a mouse, and the like; an output section 707 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 708 including a hard disk and the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. A drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read out therefrom is mounted into the storage section 708 as necessary.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program can be downloaded and installed from a network through the communication section 709, and/or installed from the removable medium 711. The computer program, when executed by a Central Processing Unit (CPU)701, performs the above-described functions defined in the method of the present application.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software or hardware. The described units may also be provided in a processor, and may be described as: a processor includes a first acquisition unit, an encryption unit, a determination unit, and a transmission unit; or a processor comprises a second acquisition unit, a parsing unit, a decryption unit and an access unit. The names of these units do not in some cases form a limitation on the units themselves, and for example, the first acquiring unit may also be described as a "unit that acquires the name of the wireless network to be shared and the access authentication information".
As another aspect, the present application also provides a non-volatile computer storage medium, which may be the non-volatile computer storage medium included in the apparatus in the above-described embodiments; or it may be a non-volatile computer storage medium that exists separately and is not incorporated into the terminal. The non-transitory computer storage medium stores one or more programs that, when executed by a device, cause the device to: acquiring the name and access verification information of a wireless network to be shared; encrypting the access verification information to obtain a ciphertext character string; obtaining an access code of the wireless network to be shared based on the name and the ciphertext character string; and sending the access code to a terminal to be accessed so as to share the wireless network to be shared with the terminal to be accessed. Or acquiring an access code of the wireless network to be accessed, wherein the access code is obtained by encrypting a ciphertext character string obtained after the access verification information of the wireless network to be accessed is encrypted based on the name of the wireless network to be accessed; analyzing the access code to obtain the name and the ciphertext character string; decrypting the ciphertext character string to obtain the access verification information; and accessing the wireless network to be accessed based on the name and the access verification information.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by a person skilled in the art that the scope of the invention as referred to in the present application is not limited to the embodiments with a specific combination of the above-mentioned features, but also covers other embodiments with any combination of the above-mentioned features or their equivalents without departing from the inventive concept. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (16)

1. A method for sharing a wireless network, the method comprising:
acquiring the name and access verification information of a wireless network to be shared;
encrypting the access verification information to obtain a ciphertext character string;
obtaining an access code of the wireless network to be shared based on the name, the ciphertext character string and a fixed arrangement sequence;
sending the access code to a terminal to be accessed so as to share the wireless network to be shared with the terminal to be accessed;
the encrypting the name and the access verification information to obtain a ciphertext character string includes:
calling a key generation function to generate a key by adopting a preset encryption type;
calling an encryption function to encrypt the access verification information by using the key to obtain a ciphertext character string;
the obtaining the access code of the wireless network to be shared based on the name and the ciphertext character string comprises:
adding a preset key identifier in front of the key to obtain a key with the identifier;
adding a preset ciphertext character string identifier in front of the ciphertext character string to obtain the ciphertext character string with the identifier;
adding a preset name identifier in front of the name of the wireless network to be shared to obtain the name of the added identifier;
combining the key with the added identifier, the ciphertext character string with the added identifier and the name of the added identifier to obtain an access code main body;
and adding a preset check mark in front of the access code main body, and adding a preset finishing mark behind the access code main body to obtain the access code.
2. The method of claim 1, wherein obtaining the access code of the wireless network to be shared based on the name and the ciphertext character string comprises:
and arranging the secret key, the name and the ciphertext character string in a preset arrangement sequence to obtain the access code.
3. The method of claim 1, wherein the sending the access code to the terminal to be accessed comprises:
sending the access code to the terminal to be accessed through at least one of the following data transmission modes: near field communication, infrared, bluetooth.
4. The method according to any one of claims 1-3, further comprising:
displaying a sending state for sending the access code, wherein the sending state comprises: successful transmission, failed transmission, or in transmission.
5. A method for accessing a wireless network, the method comprising:
acquiring an access code of a wireless network to be accessed, wherein the access code is acquired based on the name of the wireless network to be accessed, a cipher text character string acquired after encrypting access verification information of the wireless network to be accessed and a fixed arrangement sequence;
analyzing the access code to obtain the name and the ciphertext character string;
decrypting the ciphertext character string to obtain the access verification information;
accessing the wireless network to be accessed based on the name and the access verification information;
the access code also comprises a key used for encrypting the access verification information; and
the analyzing the access code to obtain the name and the ciphertext character string includes:
sequentially reading the access codes, and determining the name, the ciphertext character string and the secret key based on a preset arrangement sequence;
the analyzing the access code to obtain the name and the ciphertext character string further comprises:
responding to the access code comprising a check identifier and an ending identifier, and detecting whether the access code comprises a secret key identifier, a ciphertext character string identifier and a name identifier;
and in response to the access code comprising the key identifier, the ciphertext character string identifier and the name identifier, extracting the character string indicated by the key identifier as the key, extracting the character string indicated by the ciphertext character string identifier as the ciphertext character string, and extracting the character string indicated by the name identifier as the name of the wireless network to be accessed.
6. The method of claim 5, wherein the decrypting the ciphertext string to obtain the access verification information comprises:
and calling a decryption function by adopting a preset decryption type to decrypt the ciphertext character string by adopting the secret key to obtain the access verification information.
7. The method of claim 5, wherein before the accessing the wireless network to be accessed based on the name and the authentication information, the method further comprises:
detecting the state of a switch accessed to a wireless network;
turning on a switch accessing the wireless network in response to detecting that the state of the switch accessing the wireless network is off;
detecting whether the wireless network is accessed currently or not in response to the detection that the state of the switch for accessing the wireless network is on;
responding to the current accessed wireless network, and displaying a wireless network switching inquiry message;
and responding to the received confirmation switching wireless network message sent by the user, and disconnecting the connection of the accessed wireless network.
8. The method of claim 5, further comprising:
displaying an access state of accessing the wireless network to be accessed, wherein the access state comprises: access success, access failure, or in-access.
9. An apparatus for sharing a wireless network, the apparatus comprising:
the first acquisition unit is used for acquiring the name and the access verification information of the wireless network to be shared;
the encryption unit is used for encrypting the access verification information to obtain a ciphertext character string;
a determining unit, configured to obtain an access code of the wireless network to be shared based on the name, the ciphertext character string, and a fixed permutation order;
a sending unit, configured to send the access code to a terminal to be accessed, so as to share the wireless network to be shared with the terminal to be accessed;
the encryption unit includes:
the generation module is used for calling a key generation function to generate a key by adopting a preset encryption type;
the encryption module is used for calling an encryption function to encrypt the access verification information by adopting the key to obtain a ciphertext character string;
the determination unit is further configured to:
adding a preset key identifier in front of the key to obtain a key with the identifier;
adding a preset ciphertext character string identifier in front of the ciphertext character string to obtain the ciphertext character string with the identifier;
adding a preset name identifier in front of the name of the wireless network to be shared to obtain the name of the added identifier;
combining the key with the added identifier, the ciphertext character string with the added identifier and the name of the added identifier to obtain an access code main body;
and adding a preset check mark in front of the access code main body, and adding a preset finishing mark behind the access code main body to obtain the access code.
10. The apparatus of claim 9, wherein the determining unit is further configured to:
and arranging the secret key, the name and the ciphertext character string in a preset arrangement sequence to obtain the access code.
11. The apparatus of claim 9, wherein the sending unit is further configured to:
sending the access code to the terminal to be accessed through at least one of the following data transmission modes: near field communication, infrared, bluetooth.
12. The apparatus according to any one of claims 9-11, further comprising:
a first display unit, configured to display a sending status of sending the access code, where the sending status includes: successful transmission, failed transmission, or in transmission.
13. An apparatus for accessing a wireless network, the apparatus comprising:
the second acquisition unit is used for acquiring an access code of the wireless network to be accessed, wherein the access code is obtained on the basis of the name of the wireless network to be accessed, a cipher text character string obtained after encrypting the access verification information of the wireless network to be accessed and a fixed arrangement sequence;
the analysis unit is used for analyzing the access code to obtain the name and the ciphertext character string;
the decryption unit is used for decrypting the ciphertext character string to obtain the access verification information;
the access unit is used for accessing the wireless network to be accessed based on the name and the access verification information;
the access code also comprises a key used for encrypting the access verification information; and
the parsing unit is further configured to:
sequentially reading the access codes, and determining the name, the ciphertext character string and the secret key based on a preset arrangement sequence;
the parsing unit is further configured to:
responding to the access code comprising a check identifier and an ending identifier, and detecting whether the access code comprises a secret key identifier, a ciphertext character string identifier and a name identifier;
and in response to the access code comprising the key identifier, the ciphertext character string identifier and the name identifier, extracting the character string indicated by the key identifier as the key, extracting the character string indicated by the ciphertext character string identifier as the ciphertext character string, and extracting the character string indicated by the name identifier as the name of the wireless network to be accessed.
14. The apparatus of claim 13, wherein the decryption unit is further configured to:
and calling a decryption function by adopting a preset decryption type to decrypt the ciphertext character string by adopting the secret key to obtain the access verification information.
15. The apparatus of claim 13, further comprising:
the detection unit is used for detecting the state of a switch accessed to the wireless network before the access unit accesses the wireless network to be accessed based on the name and the verification information;
turning on a switch accessing the wireless network in response to detecting that the state of the switch accessing the wireless network is off;
detecting whether the wireless network is accessed currently or not in response to the detection that the state of the switch for accessing the wireless network is on;
responding to the current accessed wireless network, and displaying a wireless network switching inquiry message;
and responding to the received confirmation switching wireless network message sent by the user, and disconnecting the connection of the accessed wireless network.
16. The apparatus of claim 13, further comprising:
a second display unit, configured to display an access status of accessing the wireless network to be accessed, where the access status includes: access success, access failure, or in-access.
CN201610812193.XA 2016-09-08 2016-09-08 Method and device for sharing wireless network and method and device for accessing wireless network Active CN106385684B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610812193.XA CN106385684B (en) 2016-09-08 2016-09-08 Method and device for sharing wireless network and method and device for accessing wireless network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610812193.XA CN106385684B (en) 2016-09-08 2016-09-08 Method and device for sharing wireless network and method and device for accessing wireless network

Publications (2)

Publication Number Publication Date
CN106385684A CN106385684A (en) 2017-02-08
CN106385684B true CN106385684B (en) 2020-02-07

Family

ID=57935466

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610812193.XA Active CN106385684B (en) 2016-09-08 2016-09-08 Method and device for sharing wireless network and method and device for accessing wireless network

Country Status (1)

Country Link
CN (1) CN106385684B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110312253B (en) * 2018-03-20 2022-08-09 杭州海康威视数字技术股份有限公司 Network access method, device and system
CN111148080A (en) * 2019-07-19 2020-05-12 广东小天才科技有限公司 Wireless network connection method and user equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1811719A1 (en) * 2006-01-24 2007-07-25 BRITISH TELECOMMUNICATIONS public limited company Internetwork key sharing
CN105451298A (en) * 2014-08-25 2016-03-30 深圳酷派技术有限公司 Network-sharing method and system, network access method and system, and electronic device
CN105704712A (en) * 2016-01-18 2016-06-22 华为技术有限公司 Network resource sharing method, mobile terminal, and server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1811719A1 (en) * 2006-01-24 2007-07-25 BRITISH TELECOMMUNICATIONS public limited company Internetwork key sharing
CN105451298A (en) * 2014-08-25 2016-03-30 深圳酷派技术有限公司 Network-sharing method and system, network access method and system, and electronic device
CN105704712A (en) * 2016-01-18 2016-06-22 华为技术有限公司 Network resource sharing method, mobile terminal, and server

Also Published As

Publication number Publication date
CN106385684A (en) 2017-02-08

Similar Documents

Publication Publication Date Title
US10182255B2 (en) Method, terminal, and system for communication pairing of a digital television terminal and a mobile terminal
US10972908B2 (en) Wireless network connection method, apparatus, and system
CN104144049B (en) A kind of encryption communication method, system and device
US10437469B2 (en) Secure interactions involving superimposing image of a virtual keypad over image of a touchscreen keypad
KR101502249B1 (en) Device communication
JP6814147B2 (en) Terminals, methods, non-volatile storage media
EP3065334A1 (en) Key configuration method, system and apparatus
CN107786331B (en) Data processing method, device, system and computer readable storage medium
CN106572427B (en) Method and device for establishing near field communication
CN102739642A (en) Permitting access to a network
CN106162537B (en) A kind of method, wireless telecom equipment and the terminal of safety certification connection
CN112003881B (en) Safety cloud mobile phone system based on private cloud
US11652640B2 (en) Systems and methods for out-of-band authenticity verification of mobile applications
JP4489601B2 (en) Security information exchange method, recorder apparatus, and television receiver
CN103701586A (en) Method and device for acquiring secret key
US8443195B2 (en) Method and apparatus for performing security communication
CN106385684B (en) Method and device for sharing wireless network and method and device for accessing wireless network
CN111130805B (en) Secure transmission method, electronic device, and computer-readable storage medium
KR20190086295A (en) User terminal device, electronic device, system comprising the same and control method thereof
WO2016206169A1 (en) Wireless access method, device and system, and storage medium
WO2015192656A1 (en) Security mode indication method and device
EP3041185A1 (en) A method for authenticating a user equipment in order to established a secured communication session with a server
WO2015124798A2 (en) Method & system for enabling authenticated operation of a data processing device
US10594486B1 (en) Password identification system and method
Ali et al. Data Hiding Technique Based on NFC-Enabled Smartphones

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant