Method and system for conveniently logging in wireless network
Technical Field
The invention relates to the field of wireless communication, in particular to a method and a system for conveniently logging in a wireless network.
Background
Wi-Fi is a technology that allows an electronic device to connect to a wireless local area network, typically using the 2.4G UHF or 5G SHF ISM radio frequency bands. Connecting to a wireless local area network is typically password protected; but may be open, allowing any device within range of the wireless lan to connect to it.
Current wireless technologies require wireless terminal clients to know the existing Service Set Identifier (SSID) and password before use. The following problems arise:
1. the service set identification and the password are not convenient to obtain, and a user cannot log in a wireless network under any condition;
2. in a commercial environment, the number of people who know the service set identifier and the password is large, and the data security cannot be guaranteed.
The existing method for logging in the wireless network is not only inconvenient in login mode, but also cannot guarantee safety, and users cannot be connected with the commercial wireless network with confidence.
The patent with publication number CN104320408A provides a login method for a Wi-Fi hotspot, in which a client locally stores a hotspot AP login table, and each record contains an SSID, an account, a password, and a mode field, and the method for the client to automatically log in the Wi-Fi hotspot AP includes: the client receives SSID information broadcasted by peripheral APs and selects one SSID; searching an AP login table by using the obtained SSID as a keyword, selecting a record with a mode field value consistent with an AP login mode, and calculating the matching length of the recorded SSID field value and the keyword; if the matching length of the plurality of records and the keyword is not 0, calculating the priority of each matching record, and selecting the record with the maximum priority; and automatically logging in the Wi-Fi hotspot AP by using the account and the password corresponding to the selected record. The hot spot login method provided by the invention supports the same account and password to login different SSIDs
The login method has good compatibility, and can normally run in the existing Wi-Fi equipment and network only by realizing the login method in a hotspot login module of a client. However, the login method of the invention is not convenient and the security is not guaranteed.
Disclosure of Invention
The invention aims to provide a method and a system for conveniently logging in a wireless network, which are used for solving the problems that a user cannot freely log in the wireless network and the safety is low in a commercial environment in the prior art.
In order to achieve the purpose, the invention adopts the technical scheme that:
a method for conveniently logging in a wireless network comprises the following steps:
s1, obtaining the service set identifier use state information of the router;
s2, judging whether an unused service set identifier exists or not, and if so, acquiring a configured service set identifier and a password; otherwise, ending the login;
and S3, logging in the wireless network according to the acquired configured service set identifier and the password.
Further, the method between step S2 and step S3 further comprises the steps of:
judging whether the obtained configured service set identifier has a duplicate name, and if so, prompting a user to reconfigure the service set identifier; if not, the configuration is completed.
Further, step S2 specifically includes:
judging whether an unconfigured service set identifier exists or not, and if so, acquiring the configured service set identifier and the password;
if the service set identifier is not configured, judging whether the service set identifier which is configured but not used in the preset time exists, and if so, acquiring the service set identifier and the password which are reconfigured; otherwise, the login is ended.
Further, step S1 is logging in the wireless configuration page through the H5 protocol to acquire the usage status information of the service set identification of the router.
Further, the router simultaneously supports a plurality of service set identification spaces and the service set identification spaces independently configure service set identifications and passwords through a wireless configuration page.
A system for facilitating entry into a wireless network, comprising:
the acquisition module is used for acquiring the use state information of the service set identifier of the router;
the judging module is used for judging whether an unused service set identifier exists or not, and if the unused service set identifier exists, acquiring the configured service set identifier and the configured password; otherwise, ending the login;
and the login module is used for logging in the wireless network according to the acquired configured service set identifier and the password.
Further, still include:
the verification module is used for judging whether the obtained configured service set identifier has a duplicate name or not, and if so, prompting a user to reconfigure the service set identifier; if not, the configuration is completed.
Further, the judging module comprises:
the unconfigured judging unit is used for judging whether an unconfigured service set identifier exists or not, and if so, acquiring the configured service set identifier and the password;
the unused judging unit is used for judging whether a configured service set identifier which is not used in the preset time exists or not if the service set identifier which is not configured does not exist, and acquiring a reconfigured service set identifier and a password if the service set identifier which is not configured exists; otherwise, the login is ended.
Further, the obtaining module comprises:
and the configuration page acquisition unit is used for logging in the wireless configuration page through the H5 protocol to acquire the use state information of the service set identification of the router.
Further, the judging module comprises:
and the wireless independent configuration unit is used for enabling the router to simultaneously support a plurality of service set identification spaces, and the service set identification spaces independently configure the service set identification and the password through a wireless configuration page.
Compared with the traditional technology, the invention has the following advantages:
1. by adopting the invention, the user can log in the wireless network more conveniently and safely.
2. Each user has exclusive service set identification and password, and the use of the system can not affect other users.
Drawings
FIG. 1 is a flowchart illustrating a method for facilitating entry into a wireless network according to an embodiment;
FIG. 2 is a system diagram of a wireless network for facilitating login according to an embodiment;
fig. 3 is a flowchart of a method for facilitating logging in to a wireless network according to the second embodiment;
fig. 4 is a flowchart of a method for facilitating logging in to a wireless network according to a third embodiment;
FIG. 5 is a system structure diagram of a convenient login wireless network implemented in the second and third embodiments;
fig. 6 is a schematic diagram of a wireless independent configuration method according to an embodiment of the present invention.
Detailed Description
The following are specific embodiments of the present invention and are further described with reference to the drawings, but the present invention is not limited to these embodiments.
Example one
The embodiment provides a method for conveniently logging in a wireless network, as shown in fig. 1, including the steps of:
s11: acquiring the use state information of the service set identifier of the router;
s12: judging whether an unused service set identifier exists, and if so, acquiring a configured service set identifier and a password; otherwise, ending the login;
s13: and logging in the wireless network according to the acquired configured service set identifier and the password.
A wireless network is a network implemented using wireless communication techniques.
The wireless network is in the category of wireless local area network, which is 'wireless compatibility certification', is essentially a commercial certification, and is also a wireless networking technology, the wireless local area network is connected with a computer through a network cable in the past, and Wi-Fi is networked through radio waves; it is common that a wireless router is used, and the effective range covered by the electric wave of the wireless router can be networked by using Wi-Fi connection, and if the wireless router is connected with an ADSL line or another internet access line, it is also called a hotspot.
Current wireless technologies require wireless terminal clients to know the existing Service Set Identifier (SSID) and password before use. The acquisition of Service Set Identifiers (SSIDs) and passwords is troublesome, and many users in a commercial environment can generate potential safety hazards.
SSID is the service set identification. The SSID technology can divide a wireless local area network into a plurality of sub-networks which need different authentication, each sub-network needs independent authentication, and only users who pass the authentication can enter the corresponding sub-network, so that unauthorized users are prevented from entering the network.
The SSID that appears below is an abbreviation for service set identification.
The invention is used for solving the two problems, can set a private SSID and a password for login at any time, does not influence other users using the wireless router in the setting and using processes, and can realize convenient login and the safety of self data communication.
In this embodiment, step S11 is to obtain the use state information of the service set identifier of the router.
Wherein, the step S11 is logging in the wireless configuration page through the H5 protocol to obtain the usage status information of the service set identifier of the router.
H5, HTML5, the fifth major modification of the web to the application hypertext markup language (HTML) in the core language, standard universal markup language. Hypertext markup language, an application under standard universal markup language. "hypertext" refers to pages that may contain pictures, links, and even non-textual elements such as music, programs, etc. The structure of the hypertext markup language includes a "header" section that provides information about the web page, and a "body" section that provides specific content of the web page.
The login via H5 protocol is for the customer to log into the wireless configuration web page of the wireless router easily.
The user firstly uses the H5 protocol to log in a wireless configuration page of the router through the SSID fixed by the router, and checks the conditions of the current SSID of the router, the information of the SSID in use and the like.
In this embodiment, step S12 is to determine whether there is an unused service set identifier, and if so, obtain a configured Service Set Identifier (SSID) and a password; otherwise, the login is ended.
When the SSID is ensured to have an unused state, wireless information, namely the SSID and the password, can be configured through the page.
In this embodiment, the router supports multiple SSID spaces simultaneously, and the multiple SSID spaces configure an SSID and a password independently through a wireless configuration page.
The specific configuration of SSID and password is shown in fig. 6, which includes 2.4G and 5G wireless channels.
Each wireless channel has multiple MAC addresses (BSSIDs) bridging the wireless network, preferably 16 BSSIDs, corresponding to 16 SSIDs, wherein SSID1 is used for H5 page login, is default set for the system, cannot be modified, has no password, and can support 16 users to login simultaneously.
BSSID 2-BSSID 16 are used for internet access of general users, the general users can be configured after logging in an H5 page according to SSIDs 2-16, and each SSID can support a plurality of users to access the internet.
The channel/bandwidth/wireless mode is configured by the administrator, and is not configurable by the general user because it affects the user's use of all SSIDs.
In this embodiment, when the user enters an environment with Wi-Fi, the SSID1 without a password is connected, the user logs in by using the H5 protocol through domain hijacking or directly inputting a router address, and the software sets the SSID1 so that the user connected with the SSID directly enters the wireless configuration management page.
The user reads the information of all current SSIDs to determine whether the current SSID has a previously connected SSID, and if so, connection can be tried.
If the login is not successful, the system inquires whether BSSID is unused, if yes, the configured SSID and the configured password are obtained, and if not, the login is finished.
Specifically, if all BSSIDs are used, the operation is ended.
If the BSSID is not used, the user inputs a new SSID and password through the H5 page.
In this embodiment, step S13 is to log in to the wireless network according to the obtained configured service set identifier and password.
If the new SSID and password configured by the user are available, the login is successful.
Each SSID does not influence each other, other users using the current wireless network are not influenced after reconfiguration, and user experience is improved. Moreover, each user has an exclusive SSID and password, so that the safety of network use is enhanced.
The embodiment further provides a system for conveniently logging in a wireless network, as shown in fig. 2, including:
an obtaining module 21, configured to obtain usage state information of a service set identifier of a router;
the judging module 22 is configured to judge whether there is an unused service set identifier, and if there is an unused service set identifier, obtain a configured service set identifier and a password; otherwise, ending the login;
and the login module 23 is configured to log in the wireless network according to the obtained configured service set identifier and the password.
In this embodiment, the obtaining module 21 includes:
and the configuration page acquisition unit is used for logging in the wireless configuration page through the H5 protocol to acquire the use state information of the service set identification of the router.
Login via H5 protocol is a wireless configuration web page for allowing a customer to conveniently log into a wireless router.
Specifically, the user firstly logs in a wireless configuration page of the router through the fixed SSID of the router by using the H5 protocol, and checks the conditions of the current SSID of the router, the SSID information in use and the like.
In this embodiment, when it is ensured that the SSID has an unused state, the wireless information, that is, the SSID and the password, may be configured through the page.
The judging module 22 includes:
and the wireless independent configuration unit is used for enabling the router to simultaneously support a plurality of SSID spaces and enabling the plurality of SSID spaces to independently configure the SSID and the password through a wireless configuration page.
The specific way to configure SSID and password is shown in fig. 6.
Each wireless channel has multiple MAC addresses (BSSIDs) bridging the wireless network, preferably 16 BSSIDs, corresponding to 16 SSIDs, wherein SSID1 is used for H5 page login, is default set for the system, cannot be modified, has no password, and can support 16 users to login simultaneously.
BSSID 2-BSSID 16 are used for internet access of general users, the general users can be configured after logging in an H5 page according to SSIDs 2-16, and each SSID can support a plurality of users to access the internet.
The channel/bandwidth/wireless mode is configured by the administrator, and is not configurable by the general user because it affects the user's use of all SSIDs.
In this embodiment, when the user enters an environment with Wi-Fi, the SSID1 without a password is connected, the user logs in by using the H5 protocol through domain hijacking or directly inputting a router address, and the software sets the SSID1 so that the user connected with the SSID directly enters the wireless configuration management page.
The user reads the information of all current SSIDs to determine whether the current SSID has a previously connected SSID, and if so, connection can be tried.
If the login is not successful, the system inquires whether BSSID is unused, if yes, the configured SSID and the configured password are obtained, and if not, the login is finished.
And the login module 23 is configured to log in the wireless network according to the obtained configured service set identifier and the password.
If the new SSID and password configured by the user are available, the login is successful.
Example two
The embodiment provides a method for conveniently logging in a wireless network, as shown in fig. 3, including the steps of:
s31: acquiring the use state information of the service set identifier of the router;
s32: judging whether an unused service set identifier exists, and if so, acquiring a configured service set identifier and a password; otherwise, ending the login;
s33: judging whether the obtained configured service set identifier has a duplicate name, and if so, prompting a user to reconfigure; otherwise, completing configuration;
s34: and logging in the wireless network according to the acquired configured service set identifier and the password.
The difference from the first embodiment is that:
in this embodiment, step S33 is to determine whether the obtained configured service set identifier has a duplicate name, and if so, prompt the user to reconfigure the service set identifier; otherwise, the configuration is completed.
Before configuration is effective, the system checks whether the configured SSID has a duplicate name phenomenon, and if the SSID is duplicated, the system prompts a user to reconfigure. If no repetition exists, the configuration is effective, the SSID module is restarted, and the use of other SSID modules is not influenced.
And after the configuration is effective, logging in the wireless network by using the modified SSID and the password.
The embodiment further provides a system for conveniently logging in a wireless network, as shown in fig. 5, including:
an obtaining module 51, configured to obtain usage state information of a service set identifier of a router;
the judging module 52 is configured to judge whether there is an unused service set identifier, and if there is an unused service set identifier, obtain a configured service set identifier and a password; otherwise, ending the login;
the checking module 53 is configured to determine whether the obtained configured service set identifier has a duplicate name, and if so, prompt the user to reconfigure the service set identifier; if not, completing configuration;
and a login module 54, configured to log in to the wireless network according to the obtained configured service set identifier and the password.
The difference from the first embodiment is that a verification module 53 is included.
Specifically, before configuration is effective, the system checks whether the configured SSID has a duplicate name phenomenon, and prompts the user to reconfigure the SSID if the SSID is duplicated. If no repetition exists, the configuration is effective, the SSID module is restarted, and the use of other SSID modules is not influenced.
And after the configuration is effective, logging in the wireless network by using the modified SSID and the password.
After verification, configuration is carried out under the condition that no duplicate name exists, and configuration failure caused by the duplicate name is avoided. The safety is enhanced.
EXAMPLE III
The embodiment provides a method for conveniently logging in a wireless network, as shown in fig. 4, including the steps of:
s41: acquiring the use state information of the service set identifier of the router;
s42: judging whether an unconfigured service set identifier exists or not, and if so, acquiring the configured service set identifier and the password;
s43: if the service set identifier is not configured, judging whether the service set identifier which is configured but not used in the preset time exists, and if so, acquiring the service set identifier and the password which are reconfigured; otherwise, ending the login;
s44: judging whether the obtained configured service set identifier has a duplicate name, and if so, prompting a user to reconfigure; otherwise, completing configuration;
s45: and logging in the wireless network according to the acquired configured service set identifier and the password.
The difference between this embodiment and the second embodiment is that the user inquires whether the BSSID is unused through the system. The unused cases include:
1. SSID and password are not configured;
2. configured, but the corresponding SSID has no SSID to which the terminal is connected within a preset time.
Thus, determining whether there is an unused SSID includes determining whether there is an unconfigured SSID and determining whether there is an SSID that has been configured that is not used at a preset time.
In the embodiment, whether an unconfigured SSID exists is judged, and if so, the configured SSID and the password are obtained;
if no SSID which is not configured exists, judging whether an SSID which is configured but is not used in the preset time exists, and if so, acquiring a reconfigured SSID and a password; otherwise, the login is ended.
The embodiment further provides a system for conveniently logging in a wireless network, as shown in fig. 5, which is different from the second embodiment in that:
the judging module 52 includes:
the unconfigured judging unit is used for judging whether an unconfigured service set identifier exists or not, and if so, acquiring the configured service set identifier and the password;
the unused judging unit is used for judging whether a configured service set identifier which is not used in the preset time exists or not if the service set identifier which is not configured does not exist, and acquiring a reconfigured service set identifier and a password if the service set identifier which is not configured exists; otherwise, the login is ended.
The user inquires through the system whether BSSID is unused. The unused cases include:
1. SSID and password are not configured;
2. configured, but the corresponding SSID has no SSID to which the terminal is connected within a preset time.
Therefore, the determining module 52 specifically includes an unconfigured determining unit and an unused determining unit, which are respectively used for determining whether there is an unconfigured SSID and determining whether there is an SSID configured and not used in the preset time.
The specific embodiments described herein are merely illustrative of the spirit of the invention. Various modifications or additions may be made to the described embodiments or alternatives may be employed by those skilled in the art without departing from the spirit or ambit of the invention as defined in the appended claims.