CN106954215B - Method and system for conveniently logging in wireless network - Google Patents

Method and system for conveniently logging in wireless network Download PDF

Info

Publication number
CN106954215B
CN106954215B CN201710211328.1A CN201710211328A CN106954215B CN 106954215 B CN106954215 B CN 106954215B CN 201710211328 A CN201710211328 A CN 201710211328A CN 106954215 B CN106954215 B CN 106954215B
Authority
CN
China
Prior art keywords
service set
password
set identifier
wireless network
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201710211328.1A
Other languages
Chinese (zh)
Other versions
CN106954215A (en
Inventor
陈晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Blue Galaxy Terminal Technology Co ltd
Original Assignee
Phicomm Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Phicomm Shanghai Co Ltd filed Critical Phicomm Shanghai Co Ltd
Priority to CN201710211328.1A priority Critical patent/CN106954215B/en
Publication of CN106954215A publication Critical patent/CN106954215A/en
Application granted granted Critical
Publication of CN106954215B publication Critical patent/CN106954215B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method and a system for conveniently logging in a wireless network, which are used for solving the problems that a user cannot freely log in the wireless network and the safety is low in a commercial environment in the prior art. The method comprises the following steps: s1, obtaining the service set identifier use state information of the router; s2, judging whether there is unused service set identification, if so, generating service set identification and cipher randomly by the service set identification/cipher generator; otherwise, ending the login; and S3, logging in the wireless network according to the service set identification and the password which are randomly generated. By adopting the invention, users do not need to configure the wireless network by themselves, the wireless network can be logged in more conveniently and safely, and each user has a dedicated service set identifier and password, so that other users cannot be influenced during use.

Description

Method and system for conveniently logging in wireless network
Technical Field
The invention relates to the field of wireless communication, in particular to a method and a system for conveniently logging in a wireless network.
Background
Wi-Fi is a technology that allows an electronic device to connect to a wireless local area network, typically using the 2.4G UHF or 5G SHF ISM radio frequency bands. Connecting to a wireless local area network is typically password protected; but may be open, allowing any device within range of the wireless lan to connect to it.
Current wireless technologies require wireless terminal clients to know the existing Service Set Identifier (SSID) and password before use. The following problems arise:
1. the service set identification and the password are not convenient to obtain, and a user cannot log in a wireless network under any condition;
2. in a commercial environment, the number of people who know the service set identifier and the password is large, and the data security cannot be guaranteed.
The existing method for logging in the wireless network is not only inconvenient in login mode, but also cannot guarantee safety, and users cannot be connected with the commercial wireless network with confidence.
The patent with publication number CN104320408A provides a login method for a Wi-Fi hotspot, in which a client locally stores a hotspot AP login table, and each record contains an SSID, an account, a password, and a mode field, and the method for the client to automatically log in the Wi-Fi hotspot AP includes: the client receives SSID information broadcasted by peripheral APs and selects one SSID; searching an AP login table by using the obtained SSID as a keyword, selecting a record with a mode field value consistent with an AP login mode, and calculating the matching length of the recorded SSID field value and the keyword; if the matching length of the plurality of records and the keyword is not 0, calculating the priority of each matching record, and selecting the record with the maximum priority; and automatically logging in the Wi-Fi hotspot AP by using the account and the password corresponding to the selected record. The hot spot login method provided by the invention supports the same account and password to login Wi-Fi hot spots of different SSIDs, has good compatibility, and can normally operate in the existing WiFi equipment and network only by realizing the login method in the hot spot login module of the client. However, the login method of the invention is not convenient and the security is not guaranteed.
Disclosure of Invention
The invention aims to provide a method and a system for conveniently logging in a wireless network, which are used for solving the problems that a user cannot freely log in the wireless network and the safety is low in a commercial environment in the prior art.
In order to achieve the purpose, the invention adopts the technical scheme that:
a method for conveniently logging in a wireless network comprises the following steps:
s1, obtaining the service set identifier use state information of the router;
s2, judging whether there is unused service set identification, if so, generating service set identification and cipher randomly by the service set identification/cipher generator; otherwise, ending the login;
and S3, logging in the wireless network according to the service set identification and the password which are randomly generated.
Further, the method between step S2 and step S3 further comprises the steps of:
judging whether the randomly generated service set identification has a duplicate name or not, and if so, regenerating the service set identification and the password; if not, the random generation is finished.
Further, step S2 specifically includes:
judging whether an unconfigured service set identifier exists or not, and if so, randomly generating a service set identifier and a password;
if the service set identifier is not configured, judging whether the service set identifier which is configured but not used in the preset time exists, and if so, randomly generating the service set identifier and the password; otherwise, the login is ended.
Further, step S1 is logging in the wireless configuration page through the H5 protocol to acquire the usage status information of the service set identification of the router.
Further, after the service set identifier and the password are randomly generated, the user is notified on a wireless configuration page, and the randomly generated service set identifier and the password are sent to the router for configuration.
A system for facilitating entry into a wireless network, comprising:
the acquisition module is used for acquiring the use state information of the service set identifier of the router;
the judgment module is used for judging whether an unused service set identifier exists or not, and if the unused service set identifier exists, the service set identifier and the password are randomly generated through the service set identifier/password generator; otherwise, ending the login;
and the login module is used for logging in the wireless network according to the service set identifier and the password which are randomly generated.
Further, still include:
the verification module is used for judging whether the randomly generated service set identifier has a duplicate name or not, and if so, regenerating the service set identifier and the password; if not, the random generation is finished.
Further, the judging module comprises:
the unconfigured judging unit is used for judging whether unconfigured service set identification exists or not, and if so, randomly generating the service set identification and the password;
the unused judging unit is used for judging whether a configured service set identifier which is not used in the preset time exists or not if the service set identifier which is not configured does not exist, and randomly generating a service set identifier and a password if the service set identifier which is not configured exists; otherwise, the login is ended.
Further, the obtaining module comprises:
and the configuration page acquisition unit is used for logging in the wireless configuration page through the H5 protocol to acquire the use state information of the service set identification of the router.
Further, the judging module comprises:
and the random generation unit is used for notifying the user on a wireless configuration page after the service set identifier and the password are randomly generated and sending the randomly generated service set identifier and the password to the router for configuration.
Compared with the traditional technology, the invention has the following advantages:
1. by adopting the invention, the user can log in the wireless network more conveniently without configuring the wireless network by himself.
2. Each user has exclusive service set identification and password, so that the use is safer, and other users cannot be influenced during use.
Drawings
FIG. 1 is a flowchart illustrating a method for facilitating entry into a wireless network according to an embodiment;
FIG. 2 is a system diagram of a wireless network for facilitating login according to an embodiment;
fig. 3 is a flowchart of a method for facilitating logging in to a wireless network according to the second embodiment;
fig. 4 is a flowchart of a method for facilitating logging in to a wireless network according to a third embodiment;
fig. 5 is a system structure diagram of a convenient login wireless network according to the second and third embodiments;
fig. 6 is a schematic diagram of a method for randomly generating a password according to an embodiment of the present invention.
Detailed Description
The following are specific embodiments of the present invention and are further described with reference to the drawings, but the present invention is not limited to these embodiments.
Example one
The embodiment provides a method for conveniently logging in a wireless network, as shown in fig. 1, including the steps of:
s11: acquiring the use state information of the service set identifier of the router;
s12: judging whether an unused service set identifier exists, if so, randomly generating a service set identifier and a password through a service set identifier/password generator; otherwise, ending the login;
s13: and logging in the wireless network according to the service set identification and the password which are randomly generated.
A wireless network is a network implemented using wireless communication techniques.
The wireless network is in the category of wireless local area network, which is 'wireless compatibility certification', is essentially a commercial certification, and is also a wireless networking technology, the wireless local area network is connected with a computer through a network cable in the past, and Wi-Fi is networked through radio waves; it is common that a wireless router is used, and the effective range covered by the electric wave of the wireless router can be networked by using Wi-Fi connection, and if the wireless router is connected with an ADSL line or another internet access line, it is also called a hotspot.
Current wireless technologies require wireless terminal clients to know the existing Service Set Identifier (SSID) and password before use. The acquisition of Service Set Identifiers (SSIDs) and passwords is troublesome, and many users in a commercial environment can generate potential safety hazards.
SSID is the service set identification. The SSID technology can divide a wireless local area network into a plurality of sub-networks which need different authentication, each sub-network needs independent authentication, and only users who pass the authentication can enter the corresponding sub-network, so that unauthorized users are prevented from entering the network.
The SSID that appears below is an abbreviation for service set identification.
The invention is used for solving the two problems, can set a private SSID and a password for login at any time, does not influence other users using the wireless router in the setting and using processes, and can realize convenient login and the safety of self data communication.
In this embodiment, step S11 is to obtain the use state information of the service set identifier of the router.
Wherein, the step S11 is logging in the wireless configuration page through the H5 protocol to obtain the usage status information of the service set identifier of the router.
H5, HTML5, the fifth major modification of the web to the application hypertext markup language (HTML) in the core language, standard universal markup language. Hypertext markup language, an application under standard universal markup language. "hypertext" refers to pages that may contain pictures, links, and even non-textual elements such as music, programs, etc. The structure of the hypertext markup language includes a "header" section that provides information about the web page, and a "body" section that provides specific content of the web page.
The login via H5 protocol is for the customer to log into the wireless configuration web page of the wireless router easily.
The user firstly uses the H5 protocol to log in a wireless configuration page of the router through the SSID fixed by the router, and checks the conditions of the current SSID of the router, the information of the SSID in use and the like.
In this embodiment, step S12 is to determine whether there is an unused service set identifier, and if there is an unused service set identifier, randomly generate a service set identifier and a password through the service set identifier/password generator; otherwise, the login is ended.
The password generator is practical random password generation software, is used for protecting personal privacy without twisting up the complicated password, and can generate a new password only by clicking the password generator.
The password generator may generate letter, number or alphanumeric passwords. Strong passwords are created to protect important data and accounts.
The specific way of randomly generating the SSID/password is shown in fig. 6, which includes 2.4G and 5G wireless channels.
Each wireless channel has multiple MAC addresses (BSSIDs) bridging the wireless network, preferably 16 BSSIDs, corresponding to 16 SSIDs, wherein SSID1 is used for H5 page login, is default set for the system, cannot be modified, has no password, and can support 16 users to login simultaneously.
BSSID 2-16 are used for general users to surf the internet, and each SSID can support multiple users to surf the internet. But obtaining the password can only be done once, and if the BSSID is currently in use, generation of a new password is not allowed.
The channel/bandwidth/wireless mode is configured by the administrator, and is not configurable by the general user because it affects the user's use of all SSIDs.
In this embodiment, when the user enters an environment with Wi-Fi, the SSID1 without a password is connected, the user logs in by using the H5 protocol through domain hijacking or directly inputting a router address, and the software sets the SSID1 so that the user connected with the SSID directly enters the wireless configuration management page.
The user reads the information of all current SSIDs to determine whether the current SSID has a previously connected SSID, and if so, connection can be tried.
If the login is not successful, the system inquires whether BSSID is unused or not, if yes, the user clicks an SSID/password generator to generate a random SSID and a random password, and if not, the login is finished.
Specifically, if all BSSIDs are used, the operation is ended.
If BSSID is not used, SSID/cipher generator generates new cipher randomly.
In this embodiment, after the random password is generated, the user is notified on the H5 page of the intelligent terminal, and the intelligent terminal automatically issues the SSID and the password to the router for configuration.
In this embodiment, step S13 is to log in the wireless network according to the randomly generated service set identifier and the password.
If the configuration is effective, logging in the wireless network by using the SSID and the password which are randomly generated, and successfully logging in.
In this embodiment, once a BSSID is used, the random SSID and the password cannot be generated any more, and a third party is not allowed to view the SSID and the password.
Each SSID does not influence each other, does not influence other users using the current wireless network, and improves user experience. Moreover, each user has an exclusive SSID and password, so that the safety of network use is enhanced.
The embodiment further provides a system for conveniently logging in a wireless network, as shown in fig. 2, including:
an obtaining module 21, configured to obtain usage state information of a service set identifier of a router;
a judging module 22, configured to judge whether there is an unused service set identifier, and if there is an unused service set identifier, randomly generate a service set identifier and a password through the service set identifier/password generator; otherwise, ending the login;
and the login module 23 is configured to log in the wireless network according to the randomly generated service set identifier and the password.
In this embodiment, the obtaining module 21 includes:
and the configuration page acquisition unit is used for logging in the wireless configuration page through the H5 protocol to acquire the use state information of the service set identification of the router.
Login via H5 protocol is a wireless configuration web page for allowing a customer to conveniently log into a wireless router.
Specifically, the user firstly logs in a wireless configuration page of the router through the fixed SSID of the router by using the H5 protocol, and checks the conditions of the current SSID of the router, the SSID information in use and the like.
In this embodiment, the determining module 22 includes:
and the random generation unit is used for notifying the user on a wireless configuration page after the service set identifier and the password are randomly generated and sending the randomly generated service set identifier and the password to the router for configuration.
The specific way of randomly generating the SSID and the password is shown in fig. 6.
Each wireless channel has multiple MAC addresses (BSSIDs) bridging the wireless network, preferably 16 BSSIDs, corresponding to 16 SSIDs, wherein SSID1 is used for H5 page login, is default set for the system, cannot be modified, has no password, and can support 16 users to login simultaneously.
BSSID 2-16 are used for general users to surf the internet, and each SSID can support multiple users to surf the internet. But obtaining the password can only be done once, and if the BSSID is currently in use, generation of a new password is not allowed.
The channel/bandwidth/wireless mode is configured by the administrator, and is not configurable by the general user because it affects the user's use of all SSIDs.
In this embodiment, when the user enters an environment with Wi-Fi, the SSID1 without a password is connected, the user logs in by using the H5 protocol through domain hijacking or directly inputting a router address, and the software sets the SSID1 so that the user connected with the SSID directly enters the wireless configuration management page.
The user reads the information of all current SSIDs to determine whether the current SSID has a previously connected SSID, and if so, connection can be tried.
If the login is not successful, the system inquires whether BSSID is unused or not, if yes, the user clicks an SSID/password generator to generate a random SSID and a random password, and if not, the login is finished.
Specifically, if all BSSIDs are used, the operation is ended.
If BSSID is not used, SSID/cipher generator generates new cipher randomly.
And the login module 23 is configured to log in the wireless network according to the randomly generated service set identifier and the password.
If the SSID and password generated randomly are available, the login is successful.
In this embodiment, once a BSSID is used, the random SSID and the password cannot be generated any more, and a third party is not allowed to view the SSID and the password. The security of the network usage is enhanced.
Example two
The embodiment provides a method for conveniently logging in a wireless network, as shown in fig. 3, including the steps of:
s31: acquiring the use state information of the service set identifier of the router;
s32: judging whether an unused service set identifier exists, if so, randomly generating a service set identifier and a password through a service set identifier/password generator; otherwise, ending the login;
s33: judging whether the randomly generated service set identification has a duplicate name, and if so, regenerating the service set identification and the password; if not, completing random generation;
s34: and logging in the wireless network according to the service set identification and the password which are randomly generated.
The difference from the first embodiment is that:
in this embodiment, step S33 is to determine whether the randomly generated service set identifier has a duplicate name, and if so, regenerate the service set identifier; otherwise, the random generation is completed.
Before random generation, the system will check if the configured SSID has duplication phenomenon, and if the SSID is duplicated, the system will generate randomly again. And if the SSID module is not repeated, the random generation is finished, and the use of other SSID modules is not influenced.
And after random generation, informing the user on an H5 page of the intelligent terminal, and automatically issuing the SSID and the password to the router for configuration.
And after the configuration is effective, logging in the wireless network by using the modified SSID and the password.
In this embodiment, once the BSSID is in use, the random SSID and the password cannot be generated any more, and a third party is not allowed to view the SSID and the password.
The embodiment further provides a system for conveniently logging in a wireless network, as shown in fig. 5, including:
an obtaining module 51, configured to obtain usage state information of a service set identifier of a router;
a judging module 52, configured to judge whether there is an unused service set identifier, and if there is an unused service set identifier, randomly generate a service set identifier and a password through the service set identifier/password generator; otherwise, ending the login;
the verification module 53 is configured to determine whether the randomly generated service set identifier has a duplicate name, and if so, re-generate the service set identifier and the password; if not, completing random generation;
and a login module 54, configured to log in to the wireless network according to the randomly generated service set identifier and the password.
The difference from the first embodiment is that:
in this embodiment, a verification module 53 is included.
Specifically, before the random generation, the system checks whether the configured SSID has a duplicate name phenomenon, and if the SSID is duplicated, the system generates the SSID again at random. And if the SSID module is not repeated, the random generation is finished, and the use of other SSID modules is not influenced.
And after random generation, informing the user on an H5 page of the intelligent terminal, and automatically issuing the SSID and the password to the router for configuration.
And after the configuration is effective, logging in the wireless network by using the modified SSID and the password.
In this embodiment, once the BSSID is in use, the random SSID and the password cannot be generated any more, and a third party is not allowed to view the SSID and the password.
Each user has a special SSID and a special password and does not influence each other, so that the safety of network use is improved.
EXAMPLE III
The embodiment provides a method for conveniently logging in a wireless network, as shown in fig. 4, including the steps of:
s41: acquiring the use state information of the service set identifier of the router;
s42: judging whether an unconfigured service set identifier exists or not, and if so, randomly generating a service set identifier and a password;
s43: if the service set identifier is not configured, judging whether the service set identifier which is configured but not used in the preset time exists, and if so, randomly generating the service set identifier and the password; otherwise, ending the login;
s44: judging whether the randomly generated service set identification has a duplicate name, and if so, regenerating the service set identification and the password; if not, completing random generation;
s45: and logging in the wireless network according to the service set identification and the password which are randomly generated.
The difference between this embodiment and the second embodiment is that the user inquires whether the BSSID is unused through the system. The unused cases include:
1. SSID and password are not configured;
2. configured, but the corresponding SSID has no SSID to which the terminal is connected within a preset time.
Thus, determining whether there is an unused SSID includes determining whether there is an unconfigured SSID and determining whether there is an SSID that has been configured that is not used at a preset time.
In the embodiment, whether an unconfigured SSID exists is judged, and if yes, a randomly generated SSID and a password are obtained;
if no SSID which is not configured exists, judging whether an SSID which is configured but is not used in the preset time exists, and if so, acquiring a reconfigured SSID and a password; otherwise, the login is ended.
Preferably, the BSSID is determined to be unused if the BSSID is configured and the corresponding SSID is not connected within 10 minutes.
The SSID and password may be regenerated to log into the wireless network.
The embodiment further provides a system for conveniently logging in a wireless network, as shown in fig. 5, which is different from the second embodiment in that:
the judging module 52 includes:
the unconfigured judging unit is used for judging whether unconfigured service set identification exists or not, and if so, randomly generating the service set identification and the password;
the unused judging unit is used for judging whether a configured service set identifier which is not used in the preset time exists or not if the service set identifier which is not configured does not exist, and randomly generating a service set identifier and a password if the service set identifier which is not configured exists; otherwise, the login is ended.
The user inquires through the system whether BSSID is unused. The unused cases include:
1. SSID and password are not configured;
2. configured, but the corresponding SSID has no SSID to which the terminal is connected within a preset time.
Therefore, the determining module 52 specifically includes an unconfigured determining unit and an unused determining unit, which are respectively used for determining whether there is an unconfigured SSID and determining whether there is an SSID configured and not used in the preset time.
The specific embodiments described herein are merely illustrative of the spirit of the invention. Various modifications or additions may be made to the described embodiments or alternatives may be employed by those skilled in the art without departing from the spirit or ambit of the invention as defined in the appended claims.

Claims (10)

1. A method for facilitating login to a wireless network, comprising the steps of:
s1, obtaining the use state information of each service set mark of the router;
s2, judging whether there is unused service set identification, if so, generating service set identification and cipher randomly by the service set identification/cipher generator; otherwise, ending the login;
and S3, logging in the wireless network according to the service set identification and the password which are randomly generated.
2. The method as claimed in claim 1, further comprising between step S2 and step S3:
judging whether the randomly generated service set identification has a duplicate name or not, and if so, regenerating the service set identification and the password; if not, the random generation is finished.
3. The method according to claim 1, wherein the step S2 specifically includes:
judging whether an unconfigured service set identifier exists or not, and if so, randomly generating a service set identifier and a password;
if the service set identifier is not configured, judging whether the service set identifier which is configured but not used in the preset time exists, and if so, randomly generating the service set identifier and the password; otherwise, the login is ended.
4. The method of claim 1, wherein step S1 is logging in the wireless configuration page via H5 protocol to obtain the service set ID usage status information of the router.
5. The method of claim 1, wherein the service set identifier and the password are randomly generated and then sent to the router for configuration after being notified to the user on a wireless configuration page.
6. A system for facilitating entry into a wireless network, comprising:
the acquisition module is used for acquiring the use state information of each service set identifier of the router;
the judgment module is used for judging whether an unused service set identifier exists or not, and if the unused service set identifier exists, the service set identifier and the password are randomly generated through the service set identifier/password generator; otherwise, ending the login;
and the login module is used for logging in the wireless network according to the service set identifier and the password which are randomly generated.
7. The system for facilitating login to a wireless network of claim 6, further comprising:
the verification module is used for judging whether the randomly generated service set identifier has a duplicate name or not, and if so, regenerating the service set identifier and the password; if not, the random generation is finished.
8. The system of claim 6, wherein the determining module comprises:
the unconfigured judging unit is used for judging whether unconfigured service set identification exists or not, and if so, randomly generating the service set identification and the password;
the unused judging unit is used for judging whether a configured service set identifier which is not used in the preset time exists or not if the service set identifier which is not configured does not exist, and randomly generating a service set identifier and a password if the service set identifier which is not configured exists; otherwise, the login is ended.
9. The system for facilitating login to a wireless network of claim 6, wherein the obtaining module comprises:
and the configuration page acquisition unit is used for logging in the wireless configuration page through the H5 protocol to acquire the use state information of the service set identification of the router.
10. The system of claim 6, wherein the determining module comprises:
and the random generation unit is used for notifying the user on a wireless configuration page after the service set identifier and the password are randomly generated and sending the randomly generated service set identifier and the password to the router for configuration.
CN201710211328.1A 2017-03-31 2017-03-31 Method and system for conveniently logging in wireless network Expired - Fee Related CN106954215B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710211328.1A CN106954215B (en) 2017-03-31 2017-03-31 Method and system for conveniently logging in wireless network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710211328.1A CN106954215B (en) 2017-03-31 2017-03-31 Method and system for conveniently logging in wireless network

Publications (2)

Publication Number Publication Date
CN106954215A CN106954215A (en) 2017-07-14
CN106954215B true CN106954215B (en) 2020-04-10

Family

ID=59474246

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710211328.1A Expired - Fee Related CN106954215B (en) 2017-03-31 2017-03-31 Method and system for conveniently logging in wireless network

Country Status (1)

Country Link
CN (1) CN106954215B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107359991A (en) * 2017-08-22 2017-11-17 上海斐讯数据通信技术有限公司 A kind of router, the method for generating cipher code of router guest network and system
CN110995644A (en) * 2019-10-19 2020-04-10 南京禾泽信息技术有限公司 Device and method capable of generating random login information

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103973501A (en) * 2014-05-28 2014-08-06 深圳市金立通信设备有限公司 Method and device for managing wireless local area network access point
CN105282819A (en) * 2014-06-23 2016-01-27 中兴通讯股份有限公司 Wireless device access method, gateway device and wireless network
CN105472703A (en) * 2014-09-11 2016-04-06 中兴通讯股份有限公司 Wireless network access method and device
CN105682015A (en) * 2016-04-05 2016-06-15 上海连尚网络科技有限公司 Method and device for establishing wireless connection
CN106412910A (en) * 2016-10-27 2017-02-15 上海斐讯数据通信技术有限公司 Method for intelligently screening SSID access point and wireless terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103973501A (en) * 2014-05-28 2014-08-06 深圳市金立通信设备有限公司 Method and device for managing wireless local area network access point
CN105282819A (en) * 2014-06-23 2016-01-27 中兴通讯股份有限公司 Wireless device access method, gateway device and wireless network
CN105472703A (en) * 2014-09-11 2016-04-06 中兴通讯股份有限公司 Wireless network access method and device
CN105682015A (en) * 2016-04-05 2016-06-15 上海连尚网络科技有限公司 Method and device for establishing wireless connection
CN106412910A (en) * 2016-10-27 2017-02-15 上海斐讯数据通信技术有限公司 Method for intelligently screening SSID access point and wireless terminal

Also Published As

Publication number Publication date
CN106954215A (en) 2017-07-14

Similar Documents

Publication Publication Date Title
CN106851632B (en) A kind of method and device of smart machine access WLAN
WO2016078301A1 (en) Wireless network access method and access apparatus, client and storage medium
CN101369893B (en) Method for local area network access authentication of casual user
CN101217575B (en) An IP address allocation and device in user end certification process
EP2953308A1 (en) Method and device for handling authentication of static user terminal
CN110061993B (en) Log generation method and device containing public network exit address and access equipment
CN101902742A (en) Configuration method for providing safe access in wireless network
CN106921963A (en) A kind of smart machine accesses the method and device of WLAN
JP2002314549A (en) User authentication system and user authentication method used for the same
US20070258415A1 (en) Handshake method for wireless client
CN104104516A (en) Portal authentication method and device
CN106792684B (en) Multi-protection wireless network safety protection system and protection method
CN104837136B (en) Wireless access authentication method and device
WO2016131289A1 (en) Method, device and user equipment for testing security of wireless hotspot
US20140161121A1 (en) Method, System and Device for Authenticating IP Phone and Negotiating Voice Domain
WO2017219748A1 (en) Method and device for access permission determination and page access
CN104955036B (en) Safe networking method and apparatus under public Wi-Fi environment
CN106954215B (en) Method and system for conveniently logging in wireless network
CN106559785A (en) Authentication method, equipment and system and access device and terminal
US20160156605A1 (en) A method for retrieving internet authentication information and means thereof
CN106954212A (en) A kind of portal authentication method and system
CN114422474A (en) User IPv6 address generation method based on RADIUS server
CN105451225B (en) Access authentication method and access authentication equipment
CN106851787B (en) Method and system for conveniently logging in wireless network
CN114338218B (en) PPPoE dialing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20201113

Address after: Room 10242, No. 260, Jiangshu Road, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Hangzhou Jiji Intellectual Property Operation Co.,Ltd.

Address before: 201616 Shanghai city Songjiang District Sixian Road No. 3666

Patentee before: Phicomm (Shanghai) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220210

Address after: 522, floor 5, No. 56, dongxinglong street, Dongcheng District, Beijing 100010

Patentee after: Beijing blue galaxy Terminal Technology Co.,Ltd.

Address before: Room 10242, No. 260, Jiangshu Road, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee before: Hangzhou Jiji Intellectual Property Operation Co.,Ltd.

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200410

CF01 Termination of patent right due to non-payment of annual fee