Method and system for conveniently logging in wireless network
Technical Field
The invention relates to the field of wireless communication, in particular to a method and a system for conveniently logging in a wireless network.
Background
Wi-Fi is a technology that allows an electronic device to connect to a wireless local area network, typically using the 2.4G UHF or 5G SHF ISM radio frequency bands. Connecting to a wireless local area network is typically password protected; but may be open, allowing any device within range of the wireless lan to connect to it.
Current wireless technologies require wireless terminal clients to know the existing Service Set Identifier (SSID) and password before use. The following problems arise:
1. the service set identification and the password are not convenient to obtain, and a user cannot log in a wireless network under any condition;
2. in a commercial environment, the number of people who know the service set identifier and the password is large, and the data security cannot be guaranteed.
The existing method for logging in the wireless network is not only inconvenient in login mode, but also cannot guarantee safety, and users cannot be connected with the commercial wireless network with confidence.
The patent with publication number CN104320408A provides a login method for a Wi-Fi hotspot, in which a client locally stores a hotspot AP login table, and each record contains an SSID, an account, a password, and a mode field, and the method for the client to automatically log in the Wi-Fi hotspot AP includes: the client receives SSID information broadcasted by peripheral APs and selects one SSID; searching an AP login table by using the obtained SSID as a keyword, selecting a record with a mode field value consistent with an AP login mode, and calculating the matching length of the recorded SSID field value and the keyword; if the matching length of the plurality of records and the keyword is not 0, calculating the priority of each matching record, and selecting the record with the maximum priority; and automatically logging in the Wi-Fi hotspot AP by using the account and the password corresponding to the selected record. The hot spot login method provided by the invention supports the same account and password to login Wi-Fi hot spots of different SSIDs, has good compatibility, and can normally operate in the existing WiFi equipment and network only by realizing the login method in the hot spot login module of the client. However, the login method of the invention is not convenient and the security is not guaranteed.
Disclosure of Invention
The invention aims to provide a method and a system for conveniently logging in a wireless network, which are used for solving the problems that a user cannot freely log in the wireless network and the safety is low in a commercial environment in the prior art.
In order to achieve the purpose, the invention adopts the technical scheme that:
a method for conveniently logging in a wireless network comprises the following steps:
s1, obtaining the service set identifier use state information of the router;
s2, judging whether there is unused service set identification, if so, generating service set identification and cipher randomly by the service set identification/cipher generator; otherwise, ending the login;
and S3, logging in the wireless network according to the service set identification and the password which are randomly generated.
Further, the method between step S2 and step S3 further comprises the steps of:
judging whether the randomly generated service set identification has a duplicate name or not, and if so, regenerating the service set identification and the password; if not, the random generation is finished.
Further, step S2 specifically includes:
judging whether an unconfigured service set identifier exists or not, and if so, randomly generating a service set identifier and a password;
if the service set identifier is not configured, judging whether the service set identifier which is configured but not used in the preset time exists, and if so, randomly generating the service set identifier and the password; otherwise, the login is ended.
Further, step S1 is logging in the wireless configuration page through the H5 protocol to acquire the usage status information of the service set identification of the router.
Further, after the service set identifier and the password are randomly generated, the user is notified on a wireless configuration page, and the randomly generated service set identifier and the password are sent to the router for configuration.
A system for facilitating entry into a wireless network, comprising:
the acquisition module is used for acquiring the use state information of the service set identifier of the router;
the judgment module is used for judging whether an unused service set identifier exists or not, and if the unused service set identifier exists, the service set identifier and the password are randomly generated through the service set identifier/password generator; otherwise, ending the login;
and the login module is used for logging in the wireless network according to the service set identifier and the password which are randomly generated.
Further, still include:
the verification module is used for judging whether the randomly generated service set identifier has a duplicate name or not, and if so, regenerating the service set identifier and the password; if not, the random generation is finished.
Further, the judging module comprises:
the unconfigured judging unit is used for judging whether unconfigured service set identification exists or not, and if so, randomly generating the service set identification and the password;
the unused judging unit is used for judging whether a configured service set identifier which is not used in the preset time exists or not if the service set identifier which is not configured does not exist, and randomly generating a service set identifier and a password if the service set identifier which is not configured exists; otherwise, the login is ended.
Further, the obtaining module comprises:
and the configuration page acquisition unit is used for logging in the wireless configuration page through the H5 protocol to acquire the use state information of the service set identification of the router.
Further, the judging module comprises:
and the random generation unit is used for notifying the user on a wireless configuration page after the service set identifier and the password are randomly generated and sending the randomly generated service set identifier and the password to the router for configuration.
Compared with the traditional technology, the invention has the following advantages:
1. by adopting the invention, the user can log in the wireless network more conveniently without configuring the wireless network by himself.
2. Each user has exclusive service set identification and password, so that the use is safer, and other users cannot be influenced during use.
Drawings
FIG. 1 is a flowchart illustrating a method for facilitating entry into a wireless network according to an embodiment;
FIG. 2 is a system diagram of a wireless network for facilitating login according to an embodiment;
fig. 3 is a flowchart of a method for facilitating logging in to a wireless network according to the second embodiment;
fig. 4 is a flowchart of a method for facilitating logging in to a wireless network according to a third embodiment;
fig. 5 is a system structure diagram of a convenient login wireless network according to the second and third embodiments;
fig. 6 is a schematic diagram of a method for randomly generating a password according to an embodiment of the present invention.
Detailed Description
The following are specific embodiments of the present invention and are further described with reference to the drawings, but the present invention is not limited to these embodiments.
Example one
The embodiment provides a method for conveniently logging in a wireless network, as shown in fig. 1, including the steps of:
s11: acquiring the use state information of the service set identifier of the router;
s12: judging whether an unused service set identifier exists, if so, randomly generating a service set identifier and a password through a service set identifier/password generator; otherwise, ending the login;
s13: and logging in the wireless network according to the service set identification and the password which are randomly generated.
A wireless network is a network implemented using wireless communication techniques.
The wireless network is in the category of wireless local area network, which is 'wireless compatibility certification', is essentially a commercial certification, and is also a wireless networking technology, the wireless local area network is connected with a computer through a network cable in the past, and Wi-Fi is networked through radio waves; it is common that a wireless router is used, and the effective range covered by the electric wave of the wireless router can be networked by using Wi-Fi connection, and if the wireless router is connected with an ADSL line or another internet access line, it is also called a hotspot.
Current wireless technologies require wireless terminal clients to know the existing Service Set Identifier (SSID) and password before use. The acquisition of Service Set Identifiers (SSIDs) and passwords is troublesome, and many users in a commercial environment can generate potential safety hazards.
SSID is the service set identification. The SSID technology can divide a wireless local area network into a plurality of sub-networks which need different authentication, each sub-network needs independent authentication, and only users who pass the authentication can enter the corresponding sub-network, so that unauthorized users are prevented from entering the network.
The SSID that appears below is an abbreviation for service set identification.
The invention is used for solving the two problems, can set a private SSID and a password for login at any time, does not influence other users using the wireless router in the setting and using processes, and can realize convenient login and the safety of self data communication.
In this embodiment, step S11 is to obtain the use state information of the service set identifier of the router.
Wherein, the step S11 is logging in the wireless configuration page through the H5 protocol to obtain the usage status information of the service set identifier of the router.
H5, HTML5, the fifth major modification of the web to the application hypertext markup language (HTML) in the core language, standard universal markup language. Hypertext markup language, an application under standard universal markup language. "hypertext" refers to pages that may contain pictures, links, and even non-textual elements such as music, programs, etc. The structure of the hypertext markup language includes a "header" section that provides information about the web page, and a "body" section that provides specific content of the web page.
The login via H5 protocol is for the customer to log into the wireless configuration web page of the wireless router easily.
The user firstly uses the H5 protocol to log in a wireless configuration page of the router through the SSID fixed by the router, and checks the conditions of the current SSID of the router, the information of the SSID in use and the like.
In this embodiment, step S12 is to determine whether there is an unused service set identifier, and if there is an unused service set identifier, randomly generate a service set identifier and a password through the service set identifier/password generator; otherwise, the login is ended.
The password generator is practical random password generation software, is used for protecting personal privacy without twisting up the complicated password, and can generate a new password only by clicking the password generator.
The password generator may generate letter, number or alphanumeric passwords. Strong passwords are created to protect important data and accounts.
The specific way of randomly generating the SSID/password is shown in fig. 6, which includes 2.4G and 5G wireless channels.
Each wireless channel has multiple MAC addresses (BSSIDs) bridging the wireless network, preferably 16 BSSIDs, corresponding to 16 SSIDs, wherein SSID1 is used for H5 page login, is default set for the system, cannot be modified, has no password, and can support 16 users to login simultaneously.
BSSID 2-16 are used for general users to surf the internet, and each SSID can support multiple users to surf the internet. But obtaining the password can only be done once, and if the BSSID is currently in use, generation of a new password is not allowed.
The channel/bandwidth/wireless mode is configured by the administrator, and is not configurable by the general user because it affects the user's use of all SSIDs.
In this embodiment, when the user enters an environment with Wi-Fi, the SSID1 without a password is connected, the user logs in by using the H5 protocol through domain hijacking or directly inputting a router address, and the software sets the SSID1 so that the user connected with the SSID directly enters the wireless configuration management page.
The user reads the information of all current SSIDs to determine whether the current SSID has a previously connected SSID, and if so, connection can be tried.
If the login is not successful, the system inquires whether BSSID is unused or not, if yes, the user clicks an SSID/password generator to generate a random SSID and a random password, and if not, the login is finished.
Specifically, if all BSSIDs are used, the operation is ended.
If BSSID is not used, SSID/cipher generator generates new cipher randomly.
In this embodiment, after the random password is generated, the user is notified on the H5 page of the intelligent terminal, and the intelligent terminal automatically issues the SSID and the password to the router for configuration.
In this embodiment, step S13 is to log in the wireless network according to the randomly generated service set identifier and the password.
If the configuration is effective, logging in the wireless network by using the SSID and the password which are randomly generated, and successfully logging in.
In this embodiment, once a BSSID is used, the random SSID and the password cannot be generated any more, and a third party is not allowed to view the SSID and the password.
Each SSID does not influence each other, does not influence other users using the current wireless network, and improves user experience. Moreover, each user has an exclusive SSID and password, so that the safety of network use is enhanced.
The embodiment further provides a system for conveniently logging in a wireless network, as shown in fig. 2, including:
an obtaining module 21, configured to obtain usage state information of a service set identifier of a router;
a judging module 22, configured to judge whether there is an unused service set identifier, and if there is an unused service set identifier, randomly generate a service set identifier and a password through the service set identifier/password generator; otherwise, ending the login;
and the login module 23 is configured to log in the wireless network according to the randomly generated service set identifier and the password.
In this embodiment, the obtaining module 21 includes:
and the configuration page acquisition unit is used for logging in the wireless configuration page through the H5 protocol to acquire the use state information of the service set identification of the router.
Login via H5 protocol is a wireless configuration web page for allowing a customer to conveniently log into a wireless router.
Specifically, the user firstly logs in a wireless configuration page of the router through the fixed SSID of the router by using the H5 protocol, and checks the conditions of the current SSID of the router, the SSID information in use and the like.
In this embodiment, the determining module 22 includes:
and the random generation unit is used for notifying the user on a wireless configuration page after the service set identifier and the password are randomly generated and sending the randomly generated service set identifier and the password to the router for configuration.
The specific way of randomly generating the SSID and the password is shown in fig. 6.
Each wireless channel has multiple MAC addresses (BSSIDs) bridging the wireless network, preferably 16 BSSIDs, corresponding to 16 SSIDs, wherein SSID1 is used for H5 page login, is default set for the system, cannot be modified, has no password, and can support 16 users to login simultaneously.
BSSID 2-16 are used for general users to surf the internet, and each SSID can support multiple users to surf the internet. But obtaining the password can only be done once, and if the BSSID is currently in use, generation of a new password is not allowed.
The channel/bandwidth/wireless mode is configured by the administrator, and is not configurable by the general user because it affects the user's use of all SSIDs.
In this embodiment, when the user enters an environment with Wi-Fi, the SSID1 without a password is connected, the user logs in by using the H5 protocol through domain hijacking or directly inputting a router address, and the software sets the SSID1 so that the user connected with the SSID directly enters the wireless configuration management page.
The user reads the information of all current SSIDs to determine whether the current SSID has a previously connected SSID, and if so, connection can be tried.
If the login is not successful, the system inquires whether BSSID is unused or not, if yes, the user clicks an SSID/password generator to generate a random SSID and a random password, and if not, the login is finished.
Specifically, if all BSSIDs are used, the operation is ended.
If BSSID is not used, SSID/cipher generator generates new cipher randomly.
And the login module 23 is configured to log in the wireless network according to the randomly generated service set identifier and the password.
If the SSID and password generated randomly are available, the login is successful.
In this embodiment, once a BSSID is used, the random SSID and the password cannot be generated any more, and a third party is not allowed to view the SSID and the password. The security of the network usage is enhanced.
Example two
The embodiment provides a method for conveniently logging in a wireless network, as shown in fig. 3, including the steps of:
s31: acquiring the use state information of the service set identifier of the router;
s32: judging whether an unused service set identifier exists, if so, randomly generating a service set identifier and a password through a service set identifier/password generator; otherwise, ending the login;
s33: judging whether the randomly generated service set identification has a duplicate name, and if so, regenerating the service set identification and the password; if not, completing random generation;
s34: and logging in the wireless network according to the service set identification and the password which are randomly generated.
The difference from the first embodiment is that:
in this embodiment, step S33 is to determine whether the randomly generated service set identifier has a duplicate name, and if so, regenerate the service set identifier; otherwise, the random generation is completed.
Before random generation, the system will check if the configured SSID has duplication phenomenon, and if the SSID is duplicated, the system will generate randomly again. And if the SSID module is not repeated, the random generation is finished, and the use of other SSID modules is not influenced.
And after random generation, informing the user on an H5 page of the intelligent terminal, and automatically issuing the SSID and the password to the router for configuration.
And after the configuration is effective, logging in the wireless network by using the modified SSID and the password.
In this embodiment, once the BSSID is in use, the random SSID and the password cannot be generated any more, and a third party is not allowed to view the SSID and the password.
The embodiment further provides a system for conveniently logging in a wireless network, as shown in fig. 5, including:
an obtaining module 51, configured to obtain usage state information of a service set identifier of a router;
a judging module 52, configured to judge whether there is an unused service set identifier, and if there is an unused service set identifier, randomly generate a service set identifier and a password through the service set identifier/password generator; otherwise, ending the login;
the verification module 53 is configured to determine whether the randomly generated service set identifier has a duplicate name, and if so, re-generate the service set identifier and the password; if not, completing random generation;
and a login module 54, configured to log in to the wireless network according to the randomly generated service set identifier and the password.
The difference from the first embodiment is that:
in this embodiment, a verification module 53 is included.
Specifically, before the random generation, the system checks whether the configured SSID has a duplicate name phenomenon, and if the SSID is duplicated, the system generates the SSID again at random. And if the SSID module is not repeated, the random generation is finished, and the use of other SSID modules is not influenced.
And after random generation, informing the user on an H5 page of the intelligent terminal, and automatically issuing the SSID and the password to the router for configuration.
And after the configuration is effective, logging in the wireless network by using the modified SSID and the password.
In this embodiment, once the BSSID is in use, the random SSID and the password cannot be generated any more, and a third party is not allowed to view the SSID and the password.
Each user has a special SSID and a special password and does not influence each other, so that the safety of network use is improved.
EXAMPLE III
The embodiment provides a method for conveniently logging in a wireless network, as shown in fig. 4, including the steps of:
s41: acquiring the use state information of the service set identifier of the router;
s42: judging whether an unconfigured service set identifier exists or not, and if so, randomly generating a service set identifier and a password;
s43: if the service set identifier is not configured, judging whether the service set identifier which is configured but not used in the preset time exists, and if so, randomly generating the service set identifier and the password; otherwise, ending the login;
s44: judging whether the randomly generated service set identification has a duplicate name, and if so, regenerating the service set identification and the password; if not, completing random generation;
s45: and logging in the wireless network according to the service set identification and the password which are randomly generated.
The difference between this embodiment and the second embodiment is that the user inquires whether the BSSID is unused through the system. The unused cases include:
1. SSID and password are not configured;
2. configured, but the corresponding SSID has no SSID to which the terminal is connected within a preset time.
Thus, determining whether there is an unused SSID includes determining whether there is an unconfigured SSID and determining whether there is an SSID that has been configured that is not used at a preset time.
In the embodiment, whether an unconfigured SSID exists is judged, and if yes, a randomly generated SSID and a password are obtained;
if no SSID which is not configured exists, judging whether an SSID which is configured but is not used in the preset time exists, and if so, acquiring a reconfigured SSID and a password; otherwise, the login is ended.
Preferably, the BSSID is determined to be unused if the BSSID is configured and the corresponding SSID is not connected within 10 minutes.
The SSID and password may be regenerated to log into the wireless network.
The embodiment further provides a system for conveniently logging in a wireless network, as shown in fig. 5, which is different from the second embodiment in that:
the judging module 52 includes:
the unconfigured judging unit is used for judging whether unconfigured service set identification exists or not, and if so, randomly generating the service set identification and the password;
the unused judging unit is used for judging whether a configured service set identifier which is not used in the preset time exists or not if the service set identifier which is not configured does not exist, and randomly generating a service set identifier and a password if the service set identifier which is not configured exists; otherwise, the login is ended.
The user inquires through the system whether BSSID is unused. The unused cases include:
1. SSID and password are not configured;
2. configured, but the corresponding SSID has no SSID to which the terminal is connected within a preset time.
Therefore, the determining module 52 specifically includes an unconfigured determining unit and an unused determining unit, which are respectively used for determining whether there is an unconfigured SSID and determining whether there is an SSID configured and not used in the preset time.
The specific embodiments described herein are merely illustrative of the spirit of the invention. Various modifications or additions may be made to the described embodiments or alternatives may be employed by those skilled in the art without departing from the spirit or ambit of the invention as defined in the appended claims.