CN108521651A - A kind of secondary authentication method of WiFi network - Google Patents

A kind of secondary authentication method of WiFi network Download PDF

Info

Publication number
CN108521651A
CN108521651A CN201810278111.7A CN201810278111A CN108521651A CN 108521651 A CN108521651 A CN 108521651A CN 201810278111 A CN201810278111 A CN 201810278111A CN 108521651 A CN108521651 A CN 108521651A
Authority
CN
China
Prior art keywords
certification
layers
access point
wireless
wireless access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810278111.7A
Other languages
Chinese (zh)
Other versions
CN108521651B (en
Inventor
程翰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Shangxiang Network Technology Co ltd
Original Assignee
连尚(新昌)网络科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 连尚(新昌)网络科技有限公司 filed Critical 连尚(新昌)网络科技有限公司
Priority to CN201810278111.7A priority Critical patent/CN108521651B/en
Publication of CN108521651A publication Critical patent/CN108521651A/en
Application granted granted Critical
Publication of CN108521651B publication Critical patent/CN108521651B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Abstract

This application provides a kind of secondary authentication methods of WiFi network, and the method includes obtaining the access information of the wireless access point for the wireless access point that wireless device scans arrive, the access information includes the encrypted message of two layers of certification;According to the access information of the wireless access point of acquisition, is established and connected by a wireless access point in two layers of certification and at least one wireless access point scanned;Three layers of certification request are sent to the network equipment;After three layers of certification success, network access authority is obtained.By the connection of two layers of certification foundation and wireless access point, the data of Radio Link are encrypted;Network access authority is obtained by three layers of certification, Internet resources is used to limit specific user (authorized user), improves the safety of WiFi network.

Description

A kind of secondary authentication method of WiFi network
【Technical field】
This application involves the Internet, applications field more particularly to a kind of secondary authentication methods of WiFi network.
【Background technology】
Wireless security is an important component of wlan system, since WiFi network uses open medium, I.e. electromagnetic wave carrys out transmission data signal for carrier, if transmission link does not use encipherment protection appropriate, the risk of data transmission It will greatly increase.Therefore, in wlan system, wireless security is particularly important.It is main in order to enhance WiFi network safety To use encryption and two security mechanisms of certification.
In the prior art, it establishes the when of connecting in wireless device and wireless access point to be encrypted and certification, to wireless access The load of point and server is larger;Or be encrypted when wireless device establishes connection with wireless access point, lack certification machine System, safety are poor;Or be authenticated after wireless device establishes connection with wireless access point, Radio Link is open chain Road is easy to be parsed by packet capturing, and safety is poor.
【Invention content】
The many aspects of the application provide a kind of secondary authentication method of WiFi network, for improving WiFi network safety Property.
The one side of the application provides a kind of secondary authentication method of WiFi network, including:Wireless device scans are obtained to arrive Wireless access point wireless access point information, the access information includes the encrypted message of two layers of certification;According to the nothing of acquisition Line access-in point information is established by a wireless access point in two layers of certification and at least one wireless access point scanned and is connected It connects;Three layers of certification request are sent to the network equipment;After three layers of certification success, network access authority is obtained.
The another aspect of the application provides a kind of secondary authentication method of WiFi network, including:Wireless device is obtained to send Acquisition request, wherein it is described obtain request include wireless access point identification information;It is corresponding to inquire the wireless access point Access information, the access information include the encrypted message of two layers of certification;The wireless access point is returned to wireless device to correspond to Access information pass through two layers of certification so that wireless device is according to the wireless access point information of acquisition and established with wireless access point Connection;And obtain network access authority by three layers of certification.
The another aspect of the application provides a kind of secondary authentication method of WiFi network, including:Wireless device carries out two layers Certification, so that wireless device and wireless access point are established and connected;Three layers of certification request that wireless device is sent are received, to wirelessly setting It is standby to carry out three layers of certification.
The another aspect of the application, provides a kind of equipment, and the equipment includes:One or more processors;Storage device, For storing one or more programs, when one or more of programs are executed by one or more of processors so that institute It states one or more processors and realizes any above-mentioned method.
The another aspect of the application provides a kind of computer readable storage medium, is stored thereon with computer program, special Sign is that the program realizes any above-mentioned method when being executed by processor.
By the technical solution it is found that the embodiment of the present application can pass through the company of two layers of certification foundation and wireless access point It connects, the data of Radio Link is encrypted;Network access authority is obtained by three layers of certification, (is awarded with limiting specific user Weigh user) Internet resources are used, improve the safety of WiFi network.
【Description of the drawings】
It in order to more clearly explain the technical solutions in the embodiments of the present application, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is some realities of the application Example is applied, it for those of ordinary skill in the art, without having to pay creative labor, can also be attached according to these Figure obtains other attached drawings.
Fig. 1 is a kind of flow diagram of the secondary authentication method for WiFi network that the embodiment of the present application one provides;
Fig. 2 is a kind of flow diagram of the secondary authentication method for WiFi network that the embodiment of the present application two provides;
Fig. 3 is a kind of flow diagram of the secondary authentication method for WiFi network that the embodiment of the present application three provides;
Fig. 4 is the block diagram suitable for the exemplary computer system/server for realizing the embodiment of the present invention.
【Specific implementation mode】
To keep the purpose, technical scheme and advantage of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical solution in some embodiments of the present application is clearly and completely described, it is clear that described reality It is some embodiments of the present application to apply example, instead of all the embodiments.Based on the embodiment in the application, the common skill in this field Whole other embodiments that art personnel are obtained without creative efforts belong to the model of the application protection It encloses.
In addition, the terms "and/or", only a kind of incidence relation of description affiliated partner, indicates may exist Three kinds of relationships, for example, A and/or B, can indicate:Individualism A exists simultaneously A and B, these three situations of individualism B.Separately Outside, character "/" herein, it is a kind of relationship of "or" to typically represent forward-backward correlation object.
Fig. 1 is a kind of flow diagram of the secondary authentication method for WiFi network that the embodiment of the present application one provides, such as Fig. 1 It is shown, include the following steps:
Step S11, the wireless access point information for the wireless access point that wireless device scans arrive, the access information packet are obtained Include the encrypted message of two layers of certification;
Step S12, it according to the wireless access point information of acquisition, at least one is wirelessly connect with what is scanned by two layers of certification A wireless access point in access point establishes connection;
Step S13, three layers of certification request are sent to the network equipment;Wherein, the network equipment includes certificate server, nothing Line access point;After three layers of certification success, you can carry out network access by the wireless access point.
The executive agent of method shown in Fig. 1 can be the client of wireless device installation;For example, installation is on the wireless device Application (APP) etc..
Wherein, the wireless device, which includes but not limited to any type, can carry out human-computer interaction with user and can realize nothing The intelligent terminal of line communication function, such as smart mobile phone, tablet computer, laptop.The intelligent terminal can To use arbitrary operating system, such as Android operation system, iOS operating systems, Windows operating system.
The wireless access point can be to provide the AP of wireless network access services, terminal device hot spot etc..It is described wireless Network includes but not limited to the Wireless LAN based on IEEE802.11 series of standard protocols, for example, being based on IEEE802.11n The Wireless LAN of agreement, IEEE802.11ac agreements, i.e., usually said WiFi network, wireless device can be by described Wireless access point accesses corresponding wireless network.In the subsequent embodiment of the present invention, to access the wireless access of WiFi network It is described for point.In the application embodiment below, wireless access point can divide with hotspot, Wi-Fi hotspot, hot spot It is not interchangeable use.
In a kind of preferred implementation of step S11,
Preferably, including following sub-step:
The client that sub-step S111, wireless device are installed obtains the mark of the wireless access point arrived according to wireless device scans Know information and establishes wireless access point scan list;
The client that sub-step S112, wireless device are installed is sent to access server obtains request, obtains access service The access information for the wireless access point that device returns;Or, being looked into the statistical information of the wireless access point obtained in advance from server Look for the corresponding access information of the wireless access point that scanning is arrived.
In a kind of preferred implementation of sub-step S111,
The wireless access point scan list is by the wireless access point near wireless device scans wireless device, according to sweeping What the identification information for the wireless access point retouched was established.
Wherein, the identification information is SSID (Service Set Identifier, the services set mark of wireless access point Know) information, for recognizing the corresponding wireless network of the wireless access point.Wireless access point is by its SSID (Service Set Identifier, service set) non-encrypted part of Information encapsulation in the packet, and broadcasted by broadcast mode.
Wireless access point near the WiFi module scanning wireless device of wireless device, based on one or more scanned A wireless access point obtains SSID (Service Set Identifier, the services set of one or more of wireless access point Mark) information, and the SSID information of one or more of wireless access point is sent to the client of wireless device, by client Scan list is established at end.
Further, the SSID information can also be refined as BSSID (Basic Service Set Identifier, Basic service set identification) new information and ESSID (Extended Service Set Identifier, service area alias) information, Wherein, the BSSID information is used for being identified smaller BSS (Basic Service Set, base station system) region, each Host is communicated in this smaller region, and the ESSID information is then applied in larger, more complex wireless network In network, here, different BSS can be expanded to corresponding ESS (Extended Service Set, multiple base station systems). In the subsequent embodiment of the present invention, by MAC (Media Access Control, media access control) conduct of wireless access point The BSSID information of wireless access point.
Preferably, the identification information is the SSID information and BSSID information of wireless access point.
Preferably, wireless device WiFi module scanning wireless device near wireless access point, obtain it is one or The scanning information of multiple wireless access point, such as encryption type (WEP, WAP-PSK, WPA2-PSK), whether created config The information such as (i.e. whether wireless device connected the wireless access point), signal strength, and wirelessly connect one or more of The client that the scanning information of access point is sent to wireless device is stored.
In a kind of preferred implementation of sub-step S112,
The client of wireless device installation is sent to access server obtains request, and acquisition access server returns wireless The access information of access point.
It is described to obtain the identification information that request includes wireless access point.Preferably, the acquisition request includes according to wireless The scan list that the identification information for the wireless access point that device scan arrives is established.
The acquisition request, request obtain the access letter of the wireless access point in the scan list from access server Breath.
In the present embodiment, the data network of wireless device is available, and the wireless device is based on current existing data network Network is completed to obtain the transmission of request, for example, based on the mobile communications network having turned on, such as 3G network, 4G networks, described in completion Obtain the transmission of request;For another example, based on the WLAN having turned on, such as WiFi network, the hair for obtaining request is completed It send.
The client of wireless device installation obtains the access information for the wireless access point that access server returns, and is stored in On wireless device.
Wherein, access server is based on the SSID information of wireless access point and BSSID information searchings and determining respective wireless The access information of access point.Specifically, the wireless access point of magnanimity and its corresponding access information are stored in access server. The each wireless access point stored in access server is uniquely determined with its corresponding SSID information and BSSID information.
The access information includes the authentication mode of wireless access point, encrypted message.The authenticating party of the wireless access point Formula includes:Whether the authentication mode of in re-authentication, re-authentication two layer certification and three layer certification is used;Wherein, described two layers Certification includes:Open system authentication, PSK authentication, 802.1x certifications, WPS certifications, CA certificate certification;Three layers of certification include: Portal certifications.The encrypted message is the authentication information of the encrypted message and three layers of certification of two layers of certification, wherein described two layers The encrypted message of certification includes the static keys of PSK access authentications, the user name and password of 802.1x access authentications, WPS accesses The CA certificate etc. of PIN, CAN certificate verification of certification;The authentication information of three layers of certification includes the user of Portal certifications Name and password.
In the present embodiment, two layers of certification are exactly the admission authentication mode completed on data link level, and three layers of certification are then It is the certification completed on IP layers.Two layers of certification be exactly user before obtaining three layers of IP address must by certification, when with Family needs same network side to connect the interaction for being authenticated data by two layers, only successfully passes certification at the beginning of accessing network It could be to Dynamic Host Configuration Protocol server application IP address, to transceiving data.The representative realization method of two layers of certification is exactly 802.1X.Three layers Certification is otherwise known as web authentication, and verification process is completed by a Web page.
Preferably, the access information of the wireless access point is that access server sends access letter to the wireless access point Inquiry request is ceased to obtain.The scan list that access server includes according to request is obtained, the wireless access into scan list Point sends out access information inquiry request, obtains the access information that wireless access point is returned according to access information inquiry request.
Preferably, the access information of the wireless access point is that access server is obtained periodically being received from wireless access point Access information database in inquire and obtain.Wireless access point periodically reports access information to access server, or believes in access When the configuration of breath changes access information system is reported to access server.Access server is by the access information according to In the identification information storage of wireless access point to access information database.When access server receives obtaining for wireless device transmission Request is taken, is inquired and is obtained in access information database according to the identification information for obtaining the wireless access point that request includes The access information of the wireless access point.
Wherein, described to obtain the identification information that request includes wireless access point;The access information includes wireless access point Authentication mode, encrypted message.
In another preferred implementation of sub-step S112,
Wireless device is according to the identification information of the wireless access point scanned, in the wireless access obtained in advance from server The corresponding access information of wireless access point scanned is searched in the statistical information of point.
In many application scenarios, wireless device can not establish network connection, such as without network, it means that wireless device The access information of wireless access point can not be obtained from the network equipment.
Wireless device obtains the access information of wireless access point from server in advance and is stored in wireless device local.Nothing Each wireless access point that line equipment is locally stored is uniquely determined with its correspondence mark.Preferably, wireless device is based on wirelessly connecing The SSID information of access point and BSSID information searchings and the access information of determining respective wireless access point.
The access information includes the authentication mode of wireless access point, encrypted message.The authenticating party of the wireless access point Formula includes:Whether the authentication mode of in re-authentication, re-authentication two layer certification and three layer certification is used;Wherein, described two layers Certification includes:Open system authentication, PSK authentication, 802.1x certifications, WPS certifications, CA certificate certification;Three layers of certification include: Portal certifications.The encrypted message is the authentication information of the encrypted message and three layers of certification of two layers of certification, wherein described two layers The encrypted message of certification includes the static keys of PSK access authentications, the user name and password of 802.1x access authentications, WPS accesses The CA certificate of PIN, CAN certificate verification of certification.
In the present embodiment, when the data network of wireless device is available, the wireless device is based on available data network The access information of wireless access point is obtained from server and is stored in wireless device local, for example, logical based on the movement having turned on Communication network, such as 3G network, 4G networks;For another example, based on the WLAN having turned on, such as WiFi network.
Preferably, the client of wireless device is based on data available when networking for the first time or periodically or according to user instruction Network obtains the access information of wireless access point from server in advance.
Preferably, the access information of the wireless access point is that access server is obtained periodically being received from wireless access point Access information database in inquire and obtain.Wireless access point periodically reports access information to access server, or believes in access When the configuration of breath changes access information system is reported to access server.Access server is by the access information according to In the identification information storage of wireless access point to access information database.When access server receives obtaining for wireless device transmission Request is taken, is inquired and is obtained in access information database according to the identification information for obtaining the wireless access point that request includes The access information of the wireless access point.
In a kind of preferred implementation of step S12,
Preferably, access information of the client based on wireless access point of wireless device installation, is established by two layers of certification With the wireless connection of wireless access point.
Preferably, including following sub-step:
Sub-step S121, display gets the wireless access point of access information from server in wireless access point list It can access prompt message;
Sub-step S122, mounted on wireless device client selected from wireless access point list using user it is wireless The access information of access point is established and the wireless connection of corresponding wireless access point by two layers of certification.
In a kind of preferred implementation of sub-step S121,
Preferably, the accessible prompt message of wireless access point is shown in the wireless access point list of client.It can be with The appraisal result is indicated with certain pattern identification, since the safety of the wireless access point using re-authentication is higher, User can be facilitated intuitively to judge the safety of wireless access point with the color of pattern identification, for example, indicating wireless with green Access point uses re-authentication, and safety is higher, indicates that wireless access point does not use re-authentication, safety relatively low with red; To facilitate user further wireless access point to be selected to access.
Preferably, the client of wireless device and the WiFi module of wireless device interact, in the system of wireless device The accessible prompt message of display wireless access point is shown in primary wireless access point list.It can be come with certain pattern identification Indicate the appraisal result, it, can be with the face of pattern identification since the safety of the wireless access point using re-authentication is higher Color facilitates user intuitively to judge the safety of wireless access point, for example, indicate that wireless access point uses re-authentication with green, Safety is higher, indicates that wireless access point does not use re-authentication, safety relatively low with red;To facilitate user further to select Select wireless access point access.
In a kind of preferred implementation of sub-step S122,
Wherein, two layers of certification include:Open system authentication, PSK authentication, 802.1x certifications, WPS certifications;Described three Layer certification include:Portal certifications.The encrypted message is the authentication information of the encrypted message and three layers of certification of two layers of certification, In, the encrypted message of two layers of certification includes the static keys of PSK access authentications, the user name of 802.1x access authentications and mouth It enables, the PIN of WPS access authentications.
Preferably, several wireless access point that user is presented in the wireless access point list of the client of wireless device The wireless access point that middle selection needs oneself, if alternatively, presenting in the primary wireless access point list of system of wireless device The wireless access point oneself needed is selected in dry wireless access point.For example, establishing connection button by clicking, foundation is wirelessly set The standby wireless connection with wireless access point.
The foundation of wireless connection can be the encrypted message of two layer certification of the client based on wireless access point, from trend without Line access point initiates the connection request, and entire connection procedure is automatically in running background;
The foundation of wireless connection can be that the encrypted message of two layers of certification of wireless access point is presented to wireless device pair The user answered in turn, uses for example, the encrypted message of two layers of certification is sent to client in a manner of the interior prompt message of application The encrypted message of family based on acquisition is wirelessly connected again, as user's selection is manually entered the mode of encrypted message to wirelessly connecing Access point sends out connection request.
For the wireless access point that two layers of authentication mode are open system authentication, wireless device can be directly accessed the nothing Line access point.
For the wireless access point that two layers of authentication mode are CA certificate certification, CA certificate described in client call, from trend Wireless access point sends out connection request, and entire connection procedure is automatically in running background.
For the wireless access point using re-authentication mode, wireless device passes through two layers of certification foundation and wireless access point Wireless connection after, acquiescence cannot pass through the wireless access point connect network;It needs further to obtain net by three layers of certification Network access rights.
In the present embodiment, wireless device is by after the wireless connection of two layers of certification foundation and wireless access point, passing through DHCP modes obtain the IP address of wireless access point distribution.
In a kind of preferred implementation of step S13,
The client of wireless device installation sends three layers of certification request to the network equipment.
In the preferred embodiment of the application, the network equipment is certificate server.
Preferably, the client call built-in browser of wireless device installation or the browser of wireless device installation, in bullet Three layers of certification request is inputted in page-out, three layers of certification request is arbitrary network connection request;Wireless access point connects After receiving the network connecting request, Http requests are redirected to certificate server.
When three layers of certification is portal authentication modes, the certificate server is portal servers.That is, described Popup web page is redirected on the web authentication homepage of Portal server.
Three layers of certification can be the authentication information of three layer certification of the client based on wireless access point, be taken from trend Portal Business device initiates the connection request, and entire connection procedure is automatically in running background;
Three layers of certification can be that the authentication information of three layers of certification of wireless access point is presented to the corresponding use of wireless device Family, for example, the authentication information of three layers of certification is sent to client in a manner of the interior prompt message of application, in turn, user is based on The authentication information obtained is authenticated again, and the mode as user's selection is manually entered encrypted message is sent out to Portal server Connection request.
Preferably, the authentication information of the three floor certification can also be user in web authentication homepage after input handset number, The identifying code sent by Portal server obtained.
Portal server certification passes through, and the wireless device of the corresponding three layers of certification request of clearance is initiated to wireless access point It lets pass and asks.
After Portal server certification passes through, prompt message is returned to wireless device, prompt can connect network.
It preferably, can be in the nothing of client after receiving Portal server and can connect the prompt message of network Line accesses in point list and/or the primary wireless access point list of wireless device and pushes prompting message to user, such as " has connected To network ".
In the preferred embodiment of the application, the network equipment is wireless access point.
Preferably, the client call built-in browser of wireless device installation or the browser of wireless device installation, in bullet Three layers of certification request is inputted in page-out, three layers of certification request is arbitrary network connection request;Wireless access point will The network connecting request is redirected to the authentication module of wireless access point.
When three layers of certification is portal authentication modes, the authentication module is portal modules.That is, the pop-up The page is redirected on the web authentication homepage of Portal modules.
Three layers of certification can be the authentication information of three layer certification of the client based on wireless access point, be taken from trend Portal Business device initiates the connection request, and entire connection procedure is automatically in running background;
Three layers of certification can be that the authentication information of three layers of certification of wireless access point is presented to the corresponding use of wireless device Family, for example, the authentication information of three layers of certification is sent to client in a manner of the interior prompt message of application, in turn, user is based on The authentication information obtained is authenticated again, and the mode as user's selection is manually entered encrypted message sends out company to Portal modules Connect request.
Preferably, the authentication information of the three floor certification can also be user in web authentication homepage after input handset number, The identifying code sent by Portal modules obtained.
After Portal module authentications pass through, prompt message is returned to wireless device, prompt can connect network.
It preferably, can be in the wireless of client after receiving Portal modules and can connect the prompt message of network It accesses in point list and/or the primary wireless access point list of wireless device and pushes prompting message to user, such as " be already connected to Network ".
In the present embodiment, by the connection of two layers of certification foundation and wireless access point, the data of Radio Link are added It is close;Network access authority is obtained by three layers of certification, Internet resources are used to limit specific user (authorized user).
Fig. 2 is a kind of flow diagram of the secondary authentication method for WiFi network that the embodiment of the present application two provides, such as Fig. 2 It is shown, include the following steps:
Step S21, the acquisition request that wireless device is sent is obtained, wherein the acquisition request includes wireless access point Identification information;
Step S22, the corresponding access information of the wireless access point is inquired, the access information includes the close of two layers of certification Code information;
Step S23, the corresponding access information of the wireless access point is returned to wireless device.
The executive agent of method shown in Fig. 2 can be access server.
Wherein, the access server, including but not limited to cloud service equipment and strange land storage service equipment etc..At this In one preferred embodiment of application, the preferably described access server is cloud service equipment.
The wireless device, which includes but not limited to any type, can carry out human-computer interaction with user and can realize channel radio The intelligent terminal of telecommunication function, such as smart mobile phone, tablet computer, laptop.
The wireless access point can be to provide the AP of wireless network access services, terminal device hot spot etc..It is described wireless Network includes but not limited to the Wireless LAN based on IEEE802.11 series of standard protocols, for example, being based on IEEE802.11n The Wireless LAN of agreement, IEEE802.11ac agreements, i.e., usually said WiFi network, wireless device can be by described Wireless access point accesses corresponding wireless network.In the subsequent embodiment of the present invention, to access the wireless access of WiFi network It is described for point.
In a kind of preferred implementation of step S21,
Access server obtains the acquisition request that wireless device is sent, wherein the acquisition request includes wireless access point Identification information.Preferably, the acquisition request includes that wireless device is built according to the identification information of the wireless access point scanned Vertical wireless access point scan list.
Wherein, the identification information is SSID (Service Set Identifier, the services set mark of wireless access point Know) information, for recognizing the corresponding wireless network of the wireless access point.Wireless access point is by its SSID (Service Set Identifier, service set) non-encrypted part of Information encapsulation in the packet, and broadcasted by broadcast mode.
Wireless access point near the WiFi module scanning wireless device of wireless device, based on one or more scanned A wireless access point obtains SSID (Service Set Identifier, the services set of one or more of wireless access point Mark) information, and the SSID information of one or more of wireless access point is sent to the client of wireless device, by client Scan list is established at end.
Further, the SSID information can also be refined as BSSID (Basic Service Set Identifier, Basic service set identification) new information and ESSID (Extended Service Set Identifier, service area alias) information, Wherein, the BSSID information is used for being identified smaller BSS (Basic ServiceSet, base station system) region, Mei Gezhu Machine is communicated in this smaller region, and the ESSID information is then applied in larger, more complex wireless network In, here, different BSS can be expanded to corresponding ESS (Extended Service Set, multiple base station systems).At this In the subsequent embodiment of invention, it regard the MAC (Media Access Control, media access control) of wireless access point as nothing The BSSID information of line access point.
Preferably, the identification information is the SSID information and BSSID information of wireless access point.
In a kind of preferred implementation of step S22,
Wherein, access server is based on the SSID information of wireless access point and BSSID information searchings and determining respective wireless The access information of access point.Specifically, the wireless access point of magnanimity and its corresponding access information are stored in access server. The each wireless access point stored in access server is uniquely determined with its corresponding SSID information and BSSID information.
The access information includes the authentication mode of wireless access point, encrypted message.The authenticating party of the wireless access point Formula includes:Whether the authentication mode of in re-authentication, re-authentication two layer certification and three layer certification is used;Wherein, described two layers Certification includes:Open system authentication, PSK authentication, 802.1x certifications, WPS certifications, CA certificate certification;Three layers of certification include: Portal certifications.The encrypted message is the authentication information of the encrypted message and three layers of certification of two layers of certification, wherein described two layers The encrypted message of certification includes the static keys of PSK access authentications, the user name and password of 802.1x access authentications, WPS accesses The CA certificate of PIN, CAN certificate verification of certification.
Preferably, the access information of the wireless access point is that access server sends access letter to the wireless access point Inquiry request is ceased to obtain.The scan list that access server includes according to request is obtained, the wireless access into scan list Point sends out access information inquiry request, obtains the access information that wireless access point is returned according to access information inquiry request.
Preferably, the access information of the wireless access point is that access server is obtained periodically being received from wireless access point Access information database in inquire and obtain.Wireless access point periodically reports access information to access server, or believes in access When the configuration of breath changes access information system is reported to access server.Access server is by the access information according to In the identification information storage of wireless access point to access information database.When access server receives obtaining for wireless device transmission Request is taken, is inquired and is obtained in access information database according to the identification information for obtaining the wireless access point that request includes The access information of the wireless access point.
In a kind of preferred implementation of step S23,
Access server returns to the corresponding access information of the wireless access point to wireless device.So as to wireless device according to The wireless access point information of acquisition passes through a wireless access in two layers of certification and at least one wireless access point scanned Point establishes connection, and after carrying out three layers of certification request success to the network equipment, network access is carried out by the wireless access point.
In the present embodiment, by provided to wireless device wireless access point two layers of certification and three layers of authentication information, can be with So that wireless device is passed through the connection of two layers of certification foundation and wireless access point, the data of Radio Link are encrypted;Pass through three Layer certification obtains network access authority, and Internet resources are used to limit specific user (authorized user).
Fig. 3 is a kind of flow diagram of the secondary authentication method for WiFi network that the embodiment of the present application three provides, such as Fig. 3 It is shown, include the following steps:
Step S31, two layers of certification are carried out to wireless device, so that wireless device and wireless access point are established and connected;
Step S32, three layers of certification request that wireless device is sent are received, three layers of certification are carried out to wireless device.
The executive agent of method shown in Fig. 3 can be wireless access point, and the wireless access point can be to provide wireless network AP, terminal device hot spot of network access service etc..
In a kind of preferred implementation of step S31,
Wireless device is established and wireless according to the access information of the wireless access point obtained from server by two layers of certification The wireless connection of access point.
The access information includes the authentication mode of wireless access point, encrypted message.The authenticating party of the wireless access point Formula includes:Whether the authentication mode of in re-authentication, re-authentication two layer certification and three layer certification is used;Wherein, described two layers Certification includes:Open system authentication, PSK authentication, 802.1x certifications, WPS certifications;Three layers of certification include:Portal certifications. The encrypted message is the authentication information of the encrypted message and three layers of certification of two layers of certification, wherein the password of two layers of certification Information include the static keys of PSK access authentications, the user name and password of 802.1x access authentications, WPS access authentications PIN, The CA certificate of CAN certificate verifications.
For the wireless access point that two layers of authentication mode are open system authentication, wireless access point directly allows wireless device Access.
For the wireless access point using re-authentication mode, wireless device passes through two layers of certification foundation and wireless access point Wireless connection after, acquiescence cannot pass through the wireless access point connect network;It needs further to obtain net by three layers of certification Network access rights.
In the present embodiment, after carrying out two layers of certification to wireless device, for wireless device distribution IP by DHCP modes Location.
In a kind of preferred implementation of step S32,
Preferably, wireless access point receives three layers of certification request that the client of wireless device installation is sent;By described three Layer certification request is redirected to certificate server, and three layers of certification are carried out to the wireless device by certificate server;Receive certification The clearance request for the clearance wireless device that server authentication is initiated after passing through;Or, wireless access point receives wireless device peace Three layers of certification request that the client of dress is sent carry out three layers of certification to the wireless device;Certification is let pass the nothing after passing through Line equipment.
In the preferred embodiment of the application,
Three layers of certification request is arbitrary network connection request;After wireless access point receives the network connecting request Http requests are redirected to certificate server, three layers of certification are carried out to the wireless device by certificate server.
When three layers of certification is portal authentication modes, the certificate server is portal servers.That is, described Popup web page is redirected on the web authentication homepage of Portal server.
Three layers of certification can be the authentication information of three layer certification of the client based on wireless access point, be taken from trend Portal Business device initiates the connection request, and entire connection procedure is automatically in running background;
Three layers of certification can be that the authentication information of three layers of certification of wireless access point is presented to the corresponding use of wireless device Family, for example, the authentication information of three layers of certification is sent to client in a manner of the interior prompt message of application, in turn, user is based on The authentication information obtained is authenticated again, and the mode as user's selection is manually entered encrypted message is sent out to Portal server Connection request.
Preferably, the authentication information of the three floor certification can also be user in web authentication homepage after input handset number, The identifying code sent by Portal server obtained.
Wireless access point receives the wireless of the corresponding three layers of certification request of the clearance initiated after Portal server certification passes through The clearance of equipment is asked, let pass the wireless device network request.
In another preferred embodiment of the application,
Three layers of certification request is arbitrary network connection request;Wireless access point receives the network connecting request Afterwards, the network connecting request is redirected to the authentication module of wireless access point.
When three layers of certification is portal authentication modes, the authentication module is portal modules.That is, the pop-up The page is redirected on the web authentication homepage of Portal modules.
Three layers of certification can be the authentication information of three layer certification of the client based on wireless access point, be taken from trend Portal Business device initiates the connection request, and entire connection procedure is automatically in running background;
Three layers of certification can be that the authentication information of three layers of certification of wireless access point is presented to the corresponding use of wireless device Family, for example, the authentication information of three layers of certification is sent to client in a manner of the interior prompt message of application, in turn, user is based on The authentication information obtained is authenticated again, and the mode as user's selection is manually entered encrypted message sends out company to Portal modules Connect request.
Preferably, the authentication information of the three floor certification can also be user in web authentication homepage after input handset number, The identifying code sent by Portal modules obtained.
After the Portal module authentications of wireless access point pass through, prompt message is returned to wireless device, prompt can connect Network.
In the present embodiment, wireless access point carries out two layers of certification to wireless device, so as to be not necessarily to line equipment establish with it is wireless The data of Radio Link are encrypted in the connection of access point;Network equipment network access authority is assigned by three layers of certification, with It limits specific user (authorized user) and uses Internet resources.
Fig. 4 shows the frame of the exemplary computer system/server 012 suitable for being used for realizing embodiment of the present invention Figure.The computer system/server 012 that Fig. 4 is shown is only an example, function that should not be to the embodiment of the present invention and use Range band carrys out any restrictions.
As shown in figure 4, computer system/server 012 is showed in the form of universal computing device.Computer system/clothes The component of business device 012 can include but is not limited to:One or more processor or processing unit 016, system storage 028, the bus 018 of connection different system component (including system storage 028 and processing unit 016).
Bus 018 indicates one or more in a few class bus structures, including memory bus or Memory Controller, Peripheral bus, graphics acceleration port, processor or the local bus using the arbitrary bus structures in a variety of bus structures.It lifts For example, these architectures include but not limited to industry standard architecture (ISA) bus, microchannel architecture (MAC) Bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) bus.
Computer system/server 012 typically comprises a variety of computer system readable media.These media can be appointed The usable medium what can be accessed by computer system/server 012, including volatile and non-volatile media, movably With immovable medium.
System storage 028 may include the computer system readable media of form of volatile memory, such as deposit at random Access to memory (RAM) 030 and/or cache memory 032.Computer system/server 012 may further include other Removable/nonremovable, volatile/non-volatile computer system storage medium.Only as an example, storage system 034 can For reading and writing immovable, non-volatile magnetic media (Fig. 4 do not show, commonly referred to as " hard disk drive ").Although in Fig. 4 It is not shown, can provide for the disc driver to moving non-volatile magnetic disk (such as " floppy disk ") read-write, and pair can The CD drive that mobile anonvolatile optical disk (such as CD-ROM, DVD-ROM or other optical mediums) is read and write.In these situations Under, each driver can be connected by one or more data media interfaces with bus 018.Memory 028 may include There is one group of (for example, at least one) program module, these program modules to be configured at least one program product, the program product To execute the function of various embodiments of the present invention.
Program/utility 040 with one group of (at least one) program module 042, can be stored in such as memory In 028, such program module 042 includes --- but being not limited to --- operating system, one or more application program, other Program module and program data may include the realization of network environment in each or certain combination in these examples.Journey Sequence module 042 usually executes function and/or method in embodiment described in the invention.
Computer system/server 012 can also with one or more external equipments 014 (such as keyboard, sensing equipment, Display 024 etc.) communication, in the present invention, computer system/server 012 is communicated with outside radar equipment, can also be with One or more enable a user to the equipment interacted with the computer system/server 012 communication, and/or with make the meter Any equipment that calculation machine systems/servers 012 can be communicated with one or more of the other computing device (such as network interface card, modulation Demodulator etc.) communication.This communication can be carried out by input/output (I/O) interface 022.Also, computer system/clothes Being engaged in device 012 can also be by network adapter 020 and one or more network (such as LAN (LAN), wide area network (WAN) And/or public network, such as internet) communication.As shown in figure 4, network adapter 020 by bus 018 and computer system/ Other modules of server 012 communicate.It should be understood that although not shown in fig 4, computer system/server 012 can be combined Using other hardware and/or software module, including but not limited to:Microcode, device driver, redundant processing unit, external magnetic Dish driving array, RAID system, tape drive and data backup storage system etc..
Processing unit 016 is stored in the program in system storage 028 by operation, described in the invention to execute Function in embodiment and/or method.
Above-mentioned computer program can be set in computer storage media, i.e., the computer storage media is encoded with Computer program, the program by one or more computers when being executed so that one or more computers execute in the present invention State method flow shown in embodiment and/or device operation.
With time, the development of technology, medium meaning is more and more extensive, and the route of transmission of computer program is no longer limited by Tangible medium, can also directly be downloaded from network etc..The arbitrary combination of one or more computer-readable media may be used. Computer-readable medium can be computer-readable signal media or computer readable storage medium.Computer-readable storage medium Matter for example may be-but not limited to-system, device or the device of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or The arbitrary above combination of person.The more specific example (non exhaustive list) of computer readable storage medium includes:There are one tools Or the electrical connections of multiple conducting wires, portable computer diskette, hard disk, random access memory (RAM), read-only memory (ROM), Erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light Memory device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer readable storage medium can With to be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or Person is in connection.
Computer-readable signal media may include in a base band or as the data-signal that a carrier wave part is propagated, Wherein carry computer-readable program code.Diversified forms may be used in the data-signal of this propagation, including --- but It is not limited to --- electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be Any computer-readable medium other than computer readable storage medium, which can send, propagate or Transmission for by instruction execution system, device either device use or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited In --- wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
It can be write with one or more programming languages or combinations thereof for executing the computer that operates of the present invention Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++, Further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be with It fully executes, partly execute on the user computer on the user computer, being executed as an independent software package, portion Divide and partly executes or executed on a remote computer or server completely on the remote computer on the user computer. Be related in the situation of remote computer, remote computer can pass through the network of any kind --- including LAN (LAN) or Wide area network (WAN) is connected to subscriber computer, or, it may be connected to outer computer (such as provided using Internet service Quotient is connected by internet).
Finally it should be noted that:Above example is only to illustrate the technical solution of the application, rather than its limitations;Although The application is described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that:It still may be used With technical scheme described in the above embodiments is modified or equivalent replacement of some of the technical features; And these modifications or replacements, each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution spirit and Range.

Claims (16)

1. a kind of secondary authentication method of WiFi network, which is characterized in that including:
The access information for the wireless access point that wireless device scans arrive is obtained, the access information includes the message in cipher of two layers of certification Breath;
According to the access information of the wireless access point of acquisition, by two layers of certification and at least one wireless access point scanned A wireless access point establish connection;
Three layers of certification request are sent to the network equipment;After three layers of certification success, network access authority is obtained.
2. according to the method described in claim 1, it is characterized in that, the access information of the wireless access point further includes:Wirelessly The authentication mode of access point.
3. according to the method described in claim 2, it is characterized in that, the authentication mode of the wireless access point includes whether to use The authentication mode of two layers of certification and three layers of certification in re-authentication, re-authentication;Wherein, two layers of certification includes open system Certification, PSK, 802.1x and WPS certification;Three layers of certification includes Portal certifications;The encrypted message packet of two layers of certification It includes at least one of following:The static keys of PSK access authentications, the user name and password of 802.1x access authentications, WPS access authentications PIN.
4. according to the method described in claim 3, it is characterized in that, according to the access information of the wireless access point of acquisition, pass through Two layers of certification establish connection with a wireless access point at least one wireless access point scanned:
Display gets the accessible prompt message of the wireless access point of access information from server in wireless access point list;
Using the access information for the wireless access point that user selects from wireless access point list, by two layers of certification establish with it is right The wireless connection for the wireless access point answered.
5. according to the method described in claim 4, it is characterized in that, according to the access information of the wireless access point of acquisition, pass through Two layers of certification establish connection with a wireless access point at least one wireless access point scanned:
The IP address of wireless access point distribution is obtained by DHCP modes.
6. according to the method described in claim 1, it is characterized in that,
The network equipment is certificate server;Three layers of certification request is redirected to access server by wireless access point Certification page;
Wireless device carries out three layers of certification using the authentication information of the three layers of certification obtained on the certification page;Three layers are recognized After demonstrate,proving successfully, the network access authority let pass by access server control wireless access point is obtained.
7. according to the method described in claim 1, it is characterized in that,
The network equipment is wireless access point;Three layers of certification request is redirected to wireless access point by wireless access point The certification page of authentication module;
Wireless device carries out three layers of certification using the authentication information of the three layers of certification obtained on the certification page;Three layers are recognized After demonstrate,proving successfully, the network access authority let pass by wireless access point is obtained.
8. a kind of secondary authentication method of WiFi network, which is characterized in that including:
Obtain the acquisition request that wireless device is sent, wherein described to obtain the identification information that request includes wireless access point;
The corresponding access information of the wireless access point is inquired, the access information includes the encrypted message of two layers of certification;
The corresponding access information of the wireless access point is returned to wireless device, so that wireless device is according to the wireless access of acquisition The access information of point is established by two layers of certification and wireless access point and is connected;And obtain network access authority by three layers of certification.
9. according to the method described in claim 8, it is characterized in that, the access information further includes:The certification of wireless access point Mode.
10. according to the method described in claim 9, it is characterized in that, the authentication mode of the wireless access point includes whether to adopt With the authentication mode of two layers of certification and three layers of certification in re-authentication, re-authentication;Wherein, two layers of certification includes Open System System certification, PSK, 802.1x and WPS certification;Three layers of certification includes Portal certifications;The encrypted message of two layers of certification Including at least one of following:The static keys of PSK access authentications, the user name and password of 802.1x access authentications, WPS accesses are recognized The PIN of card.
11. a kind of secondary authentication method of WiFi network, which is characterized in that including:
Two layers of certification are carried out to wireless device, so that wireless device and wireless access point are established and connected;
Three layers of certification request that wireless device is sent are received, three layers of certification are carried out to wireless device.
12. according to the method for claim 11, which is characterized in that
Two layers of certification include:Open system authentication, PSK authentication, 802.1x certifications, WPS certifications;Three layers of certification packet It includes:Portal certifications.
13. according to the method for claim 11, which is characterized in that the method further includes:
It is that wireless device distributes IP address by DHCP modes after carrying out two layers of certification to wireless device.
14. according to the method for claim 11, which is characterized in that
Three layers of certification request that wireless device is sent are received, carrying out three layers of certification to wireless device includes:
Wireless access point receives three layers of certification request that the client of wireless device installation is sent;By three layers of certification request weight It is directed to certificate server, three layers of certification are carried out to the wireless device by certificate server;It is logical to receive certificate server certification Later the clearance request for the clearance wireless device initiated;Or,
Wireless access point receives three layers of certification request that the client of wireless device installation is sent, and three are carried out to the wireless device Layer certification;Certification is let pass the wireless device after passing through.
15. a kind of equipment, which is characterized in that the equipment includes:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors so that one or more of processors are real The now method as described in any in claim 1-14.
16. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The method as described in any in claim 1-14 is realized when execution.
CN201810278111.7A 2018-03-30 2018-03-30 Secondary authentication method of WiFi network Active CN108521651B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810278111.7A CN108521651B (en) 2018-03-30 2018-03-30 Secondary authentication method of WiFi network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810278111.7A CN108521651B (en) 2018-03-30 2018-03-30 Secondary authentication method of WiFi network

Publications (2)

Publication Number Publication Date
CN108521651A true CN108521651A (en) 2018-09-11
CN108521651B CN108521651B (en) 2022-04-22

Family

ID=63431007

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810278111.7A Active CN108521651B (en) 2018-03-30 2018-03-30 Secondary authentication method of WiFi network

Country Status (1)

Country Link
CN (1) CN108521651B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109862605A (en) * 2019-01-22 2019-06-07 上海连尚网络科技有限公司 A kind of networking methods and equipment for terminal device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101651682A (en) * 2009-09-15 2010-02-17 杭州华三通信技术有限公司 Method, system and device of security certificate
CN102088702A (en) * 2009-12-03 2011-06-08 中国电信股份有限公司 Method and system for accessing wireless network into user residential gateway
CN102970732A (en) * 2012-11-26 2013-03-13 中兴通讯股份有限公司 Method, system and equipment for wireless local area network (WLAN) sharing authentication
WO2015043649A1 (en) * 2013-09-27 2015-04-02 Arcelik Anonim Sirketi Connecting a household appliance to wlan using a temporary network
WO2015154454A1 (en) * 2014-09-11 2015-10-15 中兴通讯股份有限公司 Wireless network connection method and device
CN105592454A (en) * 2014-10-21 2016-05-18 中兴通讯股份有限公司 Method and system for realizing WLAN sharing and WLAN sharing register server
CN106954212A (en) * 2017-03-02 2017-07-14 上海斐讯数据通信技术有限公司 A kind of portal authentication method and system
US20180070231A1 (en) * 2016-09-02 2018-03-08 Blackberry Limited Method and device for facilitating authentication over a wireless network

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101651682A (en) * 2009-09-15 2010-02-17 杭州华三通信技术有限公司 Method, system and device of security certificate
CN102088702A (en) * 2009-12-03 2011-06-08 中国电信股份有限公司 Method and system for accessing wireless network into user residential gateway
CN102970732A (en) * 2012-11-26 2013-03-13 中兴通讯股份有限公司 Method, system and equipment for wireless local area network (WLAN) sharing authentication
WO2015043649A1 (en) * 2013-09-27 2015-04-02 Arcelik Anonim Sirketi Connecting a household appliance to wlan using a temporary network
WO2015154454A1 (en) * 2014-09-11 2015-10-15 中兴通讯股份有限公司 Wireless network connection method and device
CN105592454A (en) * 2014-10-21 2016-05-18 中兴通讯股份有限公司 Method and system for realizing WLAN sharing and WLAN sharing register server
US20180070231A1 (en) * 2016-09-02 2018-03-08 Blackberry Limited Method and device for facilitating authentication over a wireless network
CN106954212A (en) * 2017-03-02 2017-07-14 上海斐讯数据通信技术有限公司 A kind of portal authentication method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王灵霞: "《网管员典藏书架 网络管理与运维实战宝典》", 31 July 2016 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109862605A (en) * 2019-01-22 2019-06-07 上海连尚网络科技有限公司 A kind of networking methods and equipment for terminal device

Also Published As

Publication number Publication date
CN108521651B (en) 2022-04-22

Similar Documents

Publication Publication Date Title
US7565529B2 (en) Secure authentication and network management system for wireless LAN applications
TWI525447B (en) Dynamic account creation with secured hotspot network
US7974606B2 (en) System and method for configuring devices for wireless communication
EP2606678B1 (en) Systems and methods for maintaining a communication session
US9979710B2 (en) Single SSID and dual-SSID enhancements
US7742602B2 (en) Cipher key setting system, access point, wireless LAN terminal, and cipher key setting method
US20080101400A1 (en) Managing attachment of a wireless terminal to local area networks
CN106921963A (en) A kind of smart machine accesses the method and device of WLAN
CN103517377B (en) Wireless network access method, Wifi access point and terminal
US8188857B2 (en) Authentication system and method thereof for wireless networks
CN102869014A (en) Terminal and data communication method
JP2018170010A (en) Terminal authentication method and device to be used for mobile communication system
CN108093461A (en) A kind of method for connecting wireless access point
CN104837136B (en) Wireless access authentication method and device
CN110113250A (en) A method of wireless access point is shared by instant message applications
CN105530589A (en) Bluetooth beacon device, wireless LAN terminal authentication access system and wireless LAN terminal authentication access method
CN107835524A (en) A kind of method for the focus narration information for obtaining and WAP being provided
CN108990048A (en) The method and apparatus for determining the mark of terminal device
CN107567017A (en) Wireless connection system, device and method
CN110113802A (en) A kind of method of the configuration information of shared wireless access point
US20090037979A1 (en) Method and System for Recovering Authentication in a Network
CN107969003A (en) A kind of wireless access authentication method
CN108521651A (en) A kind of secondary authentication method of WiFi network
CN107770835A (en) A kind of method, equipment and computer-readable storage medium for connecting WAP
CN108601064A (en) A method of providing and obtain wireless access point relevant information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210416

Address after: Zone E, 9th floor, No.1 Lane 666, zhangheng Road, China (Shanghai) pilot Free Trade Zone, 201203

Applicant after: Shanghai Shangxiang Network Technology Co.,Ltd.

Address before: 312599 B-2, 3 floor, Jiayi Plaza, 127 East Renmin Road, Nanming street, Xinchang, Shaoxing, Zhejiang

Applicant before: LIANSHANG (XINCHANG) NETWORK TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant