CN111031540A - Wireless network connection method and computer storage medium - Google Patents

Wireless network connection method and computer storage medium Download PDF

Info

Publication number
CN111031540A
CN111031540A CN201911159263.6A CN201911159263A CN111031540A CN 111031540 A CN111031540 A CN 111031540A CN 201911159263 A CN201911159263 A CN 201911159263A CN 111031540 A CN111031540 A CN 111031540A
Authority
CN
China
Prior art keywords
client
network connection
background server
terminal user
bits
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911159263.6A
Other languages
Chinese (zh)
Other versions
CN111031540B (en
Inventor
华珉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ruting Information Technology Shanghai Co Ltd
Original Assignee
Ruting Information Technology Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ruting Information Technology Shanghai Co Ltd filed Critical Ruting Information Technology Shanghai Co Ltd
Priority to CN201911159263.6A priority Critical patent/CN111031540B/en
Publication of CN111031540A publication Critical patent/CN111031540A/en
Application granted granted Critical
Publication of CN111031540B publication Critical patent/CN111031540B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a wireless network connection method, which comprises the following steps: acquiring a client login request sent by a terminal user; verifying according to the client account information of the terminal user, allowing the terminal user to log in the client after the verification is passed, and returning a network connection authentication account to the client; acquiring a safe hotspot information request sent by a client; returning safe hotspot information to the client according to the request; receiving a network connection authentication account and a connection authentication request sent by a client, and authenticating according to the network connection authentication account and the connection authentication request; after the authentication is successful, a configuration file is issued to the gateway according to the network connection authentication account; the gateway releases the terminal user, and the client is successfully networked. The wireless network connection method can accurately match the hot spot, avoids the possibility of disguising the attack of the hot spot, and improves the security of wireless network connection. The network environment is easily built by combining the current network architecture of the user, and the economic cost is greatly saved.

Description

Wireless network connection method and computer storage medium
Technical Field
The invention relates to the technical field of computers, in particular to a wireless network connection method and a computer storage medium.
Background
The existing wireless network connection technology has poor safety and high deployment and implementation difficulty. The security of the method mainly depends on the encryption type of Wi-Fi, and the method can be mainly divided into three categories:
a) open Network (Open Network). Namely, a network which can establish connection without any password;
b) single cipher encryption networks (WPA2-PSK, and more recently WPA 3-PSK). Namely, the user only needs to input a single fixed password to connect the network;
c) enterprise-level encrypted wireless security networks (WPA2-Enterprise, and more recently PA 3-Enterprise). Namely, the user can connect the network only by a group of specified connection credentials (user name and corresponding password) and authentication through a network background server, which is the existing wireless network connection scheme of the wireless network security protocol with the highest security standard that can be provided under the current technical conditions, and has the problems and disadvantages that:
open networks (Open networks) do not have any security implications. Data interaction appears in the medium (namely air) in clear code, and can be acquired and interpreted by anyone;
single password encrypted networks (WPA2-PSK, and more recently WPA3-PSK) require only one password to establish a network connection. The security is slightly higher than that of an open network, but the password is still easy to break, and is easy to be threatened by security vulnerabilities such as disguised AP and man-in-the-middle attack;
enterprise-level encrypted wireless security networks (WPA2-Enterprise, and more recently WPA 3-Enterprise). The main problems and defects are four:
firstly, the method comprises the following steps: the difficulty of highly complex implementation and high capital and human resource costs associated with each item. Including the cost of infrastructure (RADIUS architecture, AD or LDAP user authentication system, etc.) (including software, hardware and cloud resources), the cost of certificate chain establishment, management and maintenance, and the cost of client configuration and end-user technical support (over 80% of end-users need Help Desk assistance, resulting in a great waste of human resources).
Secondly, the method comprises the following steps: the connection credentials (username and corresponding password) are automatically stored. Once a user logs onto an enterprise-level encrypted wireless security network once using certain connection credentials (username and corresponding password), the connection credentials are automatically stored as configuration information by the mobile device. When the user (even the user himself, such as the mobile device is lost) logs in the enterprise-level encrypted wireless security network again by using the mobile device, the user can log in successfully automatically by means of the configuration information stored in the mobile device without re-inputting the connection credentials. This undoubtedly greatly reduces the security of enterprise-level encrypted wireless secure network connections.
Thirdly, the method comprises the following steps: the connection credentials (username and corresponding password) are transmitted in clear. The enterprise-level encryption wireless security network adopts a plaintext form for transmission of connection credentials (user name and corresponding password) in the connection process, and is always subject to disputes and scaling. The clear text transmission form undoubtedly makes the enterprise-level encryption wireless security network more vulnerable to the threats of disguised AP and man-in-the-middle attacks when the connection is established.
Fourthly: and the safety is reduced because of no certificate verification. The enterprise-level encryption wireless security network can be configured with SSL digital certificates, and the user side verifies the identity of the server side through the certificates in the connection process, so that the connection security is improved. Configuring the SSL digital certificate and enabling the certificate authentication server to perform the identity function requires complicated steps. The method comprises the following steps: the method comprises the steps of applying for a certificate chain, deploying certificates at a service end, downloading and installing certificates at a user end, respectively starting a certificate verification server function, loading certificates at the user end, updating the certificates at the server end after the certificates are expired, updating all the certificates at the client end and the like. Not only is the deployment cost of the server greatly increased, but also most users cannot smoothly and autonomously complete the configuration of the client and start the function. Even some mobile end-system platforms (such as iOS) do not support user-autonomous configuration to enable this functionality. Thereby leading to the identity of the unauthenticated server side in the connection and reducing the security of the connection.
Disclosure of Invention
Aiming at the defects in the prior art, the embodiment of the invention provides a wireless network connection method and a computer storage medium, which can accurately match a security hotspot, avoid the possibility of disguising hotspot attacks, improve the security of wireless network connection, facilitate the construction of a network environment by combining with the current network architecture of a user, greatly save the economic cost and simultaneously reduce the difficulty of accessing the security network of the type by the user to the maximum extent.
In a first aspect, a method for connecting a wireless network according to an embodiment of the present invention includes:
a terminal user sends a client login request to a background server;
the background server receives a client login request sent by a terminal user, performs login verification according to client account information of the terminal user, allows the terminal user to login the client after the verification is passed, and returns a network connection authentication account to the client;
a background server acquires a safe hotspot information request sent by a client;
the background server returns safe hotspot information to the client;
the client matches the hot spot information returned by the background server with the spot information;
a terminal user sends a network connection authentication account to a background server through a client and requests connection authentication to try to establish secure connection;
a background server acquires a network connection authentication account sent by a client and performs authentication;
the background server successfully authenticates and issues a configuration file to the gateway according to the network connection authentication account;
the gateway distributes a bandwidth releasing client according to the configuration file issued by the background server;
the client acquires a gateway release instruction, and the terminal user is successfully connected to the secure network.
Optionally, a specific method for the client to attempt to establish the secure connection includes:
starting the identity function of a certificate verification background server;
automatically downloading an installation certificate, adding trust, and initiating a connection request to a hotspot successfully matched;
the client starts the double authentication function and encrypts by using a symmetric encryption algorithm.
Optionally, the hotspot information includes SSID, BSSID, and latitude and longitude.
Optionally, a specific method of the symmetric encryption algorithm is as follows: and changing the original data block of 64 bits into a ciphertext output block with the data length of 64 bits, wherein 8 bits are parity check bits, and 56 bits are used as the length of the password.
In a second aspect, a wireless network connection method provided in an embodiment of the present invention is applicable to a background server, and the method includes:
acquiring a login request sent by a terminal user through a client;
verifying according to the client account information of the terminal user, allowing the terminal user to log in the client after the verification is passed, and returning a network connection authentication account to the client;
acquiring a safe hotspot information request sent by a client;
returning safe hotspot information to the client according to the request;
receiving a network connection authentication account number and a connection authentication request sent by a client, and authenticating according to the authentication account number and the connection authentication request;
and after the authentication is successful, the configuration file is issued to the gateway according to the network connection authentication account.
Optionally, the hotspot information includes SSID, BSSID, and latitude and longitude.
In a third aspect, a wireless network connection method provided in an embodiment of the present invention is applicable to a client, and the method includes:
sending a login request to a background server;
receiving login verification passing information and a network connection authentication account sent by a background server;
sending a safe hotspot information request to a background server;
receiving and acquiring safe hotspot information returned by a background server;
hot spot information returned by the background server is matched with the on-site hot spot information;
sending a network connection authentication account number to a background server, requesting connection authentication, and trying to establish a secure connection;
and acquiring a gateway release instruction and successfully connecting to the secure network.
Optionally, a specific method for attempting to establish a secure connection includes:
starting the identity function of a certificate verification background server;
automatically downloading an installation certificate, adding trust, and initiating a connection request to a hotspot successfully matched;
the client starts the double verification function and encrypts by using a symmetric encryption algorithm.
Optionally, a specific method of the symmetric encryption algorithm is as follows: and changing the original data block of 64 bits into a ciphertext output block with the data length of 64 bits, wherein 8 bits are parity check bits, and 56 bits are used as the length of the password.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, in which a computer program is stored, the computer program including program instructions, which, when executed by a processor, cause the processor to execute the method described in the above embodiment.
The invention has the beneficial effects that:
the wireless network connection method provided by the embodiment can accurately match the hot spot, avoids the possibility of pretending the attack of the hot spot, and improves the security of wireless network connection. The network environment is easily built by combining the current network architecture of the user, and the economic cost is greatly saved.
Drawings
In order to more clearly illustrate the detailed description of the invention or the technical solutions in the prior art, the drawings that are needed in the detailed description of the invention or the prior art will be briefly described below. Throughout the drawings, like elements or portions are generally identified by like reference numerals. In the drawings, elements or portions are not necessarily drawn to scale.
Fig. 1 is a flowchart illustrating a wireless network connection method according to a first embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
It is to be noted that, unless otherwise specified, technical or scientific terms used herein shall have the ordinary meaning as understood by those skilled in the art to which the invention pertains.
As shown in fig. 1, a flowchart of a wireless network connection method according to a first embodiment of the present invention is shown. The wireless network connection method provided by the embodiment comprises the following steps:
s1, the terminal user sends the client login request to the background server.
The terminal user starts the APP of the wireless network connection client, and inputs user information (user name and password) to log in.
And S2, the background server receives the client login request sent by the terminal user, performs login verification according to the client account information of the terminal user, allows the terminal user to log in the client after the verification is passed, and returns a network connection authentication account to the client.
The background server receives a client user name and a password sent by a terminal user, login verification is carried out on user information, after the user information passes the verification, the user returns to login to the client, and the terminal user successfully logs in. The background server returns network connection authentication account information to the client, wherein the network connection authentication account information can be a user name and a corresponding password of network connection.
And S3, the background server acquires the safe hotspot information request sent by the client.
And S4, the background server returns the safe hotspot information to the client.
The client sends a security hotspot information request to the background server. The hotspot information comprises SSID, BSSID, longitude and latitude and the like. And the background server returns corresponding safe hotspot information according to the safe hotspot information request sent by the client.
And S5, matching the hotspot information returned by the client through the background server with the on-site hotspot information.
And S6, the terminal user sends a network connection authentication account number to the background server through the client and requests connection authentication to try to establish secure connection.
Specifically, the specific method for the client to attempt to establish the secure connection includes:
starting the identity function of a certificate verification background server;
automatically downloading an installation certificate, adding trust, and initiating a connection request to a hotspot successfully matched;
the client starts the double verification function and encrypts by using a symmetric encryption algorithm.
The specific method of the symmetric encryption algorithm is as follows: and changing the original data block of 64 bits into a ciphertext output block with the data length of 64 bits, wherein 8 bits are parity check bits, and 56 bits are used as the length of the password. Firstly, the input 64-bit data block is recombined according to bits, the output is divided into two parts of L0 and R0, each part is 32 bits long, front and back replacement is carried out, finally, L0 outputs left 32 bits, R0 outputs right 32 bits, L16 and R16 are obtained after 16 times of iterative operation according to the rule, the L16 and the R16 are used as input, and inverse replacement opposite to the initial replacement is carried out, so that the ciphertext output block is obtained.
The client side accurately matches the returned hotspot information with the on-site hotspot information, so that the possibility of pretending hotspot attack is avoided, and the security of wireless network connection is improved. In the process of trying to establish the secure connection, the client opens the dual verification function, so that the plaintext transmission of the connection certificate is avoided, and the security of the wireless network connection can be improved. The certificate is started to verify the identity of the background server, so that the attack of the disguised server is prevented, and the security of wireless network connection is further improved. The installation certificate is automatically downloaded, so that the convenience of user operation is greatly improved, and the misoperation of the user is reduced.
And S7, the background server acquires the network connection authentication account sent by the client and authenticates the network connection authentication account.
And S8, the background server successfully authenticates and issues the configuration file to the gateway according to the network connection authentication account.
And S9, the gateway distributes the bandwidth releasing client according to the configuration file sent by the background server.
And S10, the client acquires a gateway release instruction and successfully connects to the secure network.
The wireless network connection method provided by the embodiment is simple to deploy, can accurately match the hot spot, avoids the possibility of disguising the attack of the hot spot, and improves the security of wireless network connection. The network environment is easily built by combining the current network architecture of the user, and the economic cost is greatly saved. In the connection process, a dual verification mode is adopted for transmission, so that the safety of wireless network connection is improved. The certificate authentication server identity function is started, attack of the disguised server is prevented, and the security of wireless network connection is further improved.
An embodiment of a computer-readable storage medium is also provided in the invention, the computer-readable storage medium storing a computer program comprising program instructions which, when executed by a processor, cause the processor to carry out the method described in the first embodiment.
The computer readable storage medium may be an internal storage unit of the terminal described in the foregoing embodiment, for example, a hard disk or a memory of the terminal. The computer readable storage medium may also be an external storage device of the terminal, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the terminal. Further, the computer-readable storage medium may also include both an internal storage unit and an external storage device of the terminal. The computer-readable storage medium is used for storing the computer program and other programs and data required by the terminal. The computer readable storage medium may also be used to temporarily store data that has been output or is to be output.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the terminal and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed terminal and method can be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the present invention, and they should be construed as being included in the following claims and description.

Claims (10)

1. A method of wireless network connection, the method comprising:
a terminal user sends a client login request to a background server;
the background server receives a client login request sent by a terminal user, performs login verification according to client account information of the terminal user, allows the terminal user to login the client after the verification is passed, and returns a network connection authentication account to the client;
a background server acquires a safe hotspot information request sent by a client;
the background server returns safe hotspot information to the client;
the client matches the hot spot information returned by the background server with the spot information;
a terminal user sends a network connection authentication account to a background server through a client and requests connection authentication to try to establish secure connection;
a background server acquires a network connection authentication account sent by a client and performs authentication;
the background server successfully authenticates and issues a configuration file to the gateway according to the network connection authentication account;
the gateway distributes a bandwidth releasing client according to the configuration file issued by the background server;
the client acquires a gateway release instruction, and the terminal user is successfully connected to the secure network.
2. The wireless networking method of claim 1, wherein said specific method of attempting to establish a secure connection comprises:
starting the identity function of a certificate verification background server;
automatically downloading an installation certificate, adding trust, and initiating a connection request to a hotspot successfully matched;
the client starts the double authentication function and encrypts by using a symmetric encryption algorithm.
3. The wireless networking method of claim 1, wherein said hotspot information comprises an SSID, a BSSID, and a latitude and longitude.
4. The wireless network connection method of claim 2, wherein the symmetric encryption algorithm is specifically characterized by: and changing the original data block of 64 bits into a ciphertext output block with the data length of 64 bits, wherein 8 bits are parity check bits, and 56 bits are used as the length of the password.
5. A wireless network connection method is applicable to a background server, and comprises the following steps:
acquiring a login request sent by a terminal user through a client;
verifying according to the client account information of the terminal user, allowing the terminal user to log in the client after the verification is passed, and returning a network connection authentication account to the client;
acquiring a safe hotspot information request sent by a client;
returning safe hotspot information to the client according to the request;
receiving a network connection authentication account number and a connection authentication request sent by a client, and authenticating according to the authentication account number and the connection authentication request;
and after the authentication is successful, the configuration file is issued to the gateway according to the network connection authentication account.
6. The wireless networking method of claim 5, wherein said hotspot information comprises an SSID, a BSSID, and a latitude and longitude.
7. A wireless network connection method is applicable to a client side, and comprises the following steps:
sending a login request to a background server;
receiving login verification passing information and a network connection authentication account sent by a background server;
sending a safe hotspot information request to a background server;
receiving and acquiring safe hotspot information returned by a background server;
hot spot information returned by the background server is matched with the on-site hot spot information;
sending a network connection authentication account number to a background server, requesting connection authentication, and trying to establish a secure connection;
and acquiring a gateway release instruction and successfully connecting to the secure network.
8. The wireless networking method of claim 7, wherein said specific method of attempting to establish a secure connection comprises:
starting the identity function of a certificate verification background server;
automatically downloading an installation certificate, adding trust, and initiating a connection request to a hotspot successfully matched;
the client starts the double verification function and encrypts by using a symmetric encryption algorithm.
9. The wireless networking method of claim 8, wherein said symmetric encryption algorithm is specifically selected from the group consisting of: and changing the original data block of 64 bits into a ciphertext output block with the data length of 64 bits, wherein 8 bits are parity check bits, and 56 bits are used as the length of the password.
10. A computer-readable storage medium, characterized in that the computer storage medium stores a computer program comprising program instructions that, when executed by a processor, cause the processor to perform the method according to any of claims 1-9.
CN201911159263.6A 2019-11-22 2019-11-22 Wireless network connection method and computer storage medium Active CN111031540B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911159263.6A CN111031540B (en) 2019-11-22 2019-11-22 Wireless network connection method and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911159263.6A CN111031540B (en) 2019-11-22 2019-11-22 Wireless network connection method and computer storage medium

Publications (2)

Publication Number Publication Date
CN111031540A true CN111031540A (en) 2020-04-17
CN111031540B CN111031540B (en) 2022-08-23

Family

ID=70207103

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911159263.6A Active CN111031540B (en) 2019-11-22 2019-11-22 Wireless network connection method and computer storage medium

Country Status (1)

Country Link
CN (1) CN111031540B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112910978A (en) * 2021-01-26 2021-06-04 杭州迪普科技股份有限公司 Method and system for synchronizing network configuration data
CN115150831A (en) * 2022-06-16 2022-10-04 阿里云计算有限公司 Processing method, device, server and medium for network access request
CN116542662A (en) * 2023-05-06 2023-08-04 上海商睿智能科技有限公司 Off-line POS machine transaction method and system
CN117459326A (en) * 2023-12-25 2024-01-26 吉林信息安全测评中心 Network safety protection system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101977383A (en) * 2010-08-03 2011-02-16 北京星网锐捷网络技术有限公司 Authentication processing method, system, client side and server for network access
CN102299945A (en) * 2010-06-28 2011-12-28 中国联合网络通信集团有限公司 Gateway configuration page registration method, system thereof and portal certificate server
US20130298215A1 (en) * 2012-05-04 2013-11-07 Rawllin International Inc. Single sign-on user registration for online or client account services
CN103856332A (en) * 2014-03-22 2014-06-11 中国科学院信息工程研究所 Implementation method of one-to-multiple account mapping binding of convenient and rapid multi-screen multi-factor WEB identity authentication
CN104113837A (en) * 2013-04-22 2014-10-22 中兴通讯股份有限公司 Method and device for access authentication of wireless local area network
CN104519490A (en) * 2013-09-27 2015-04-15 中兴通讯股份有限公司 WIFI (wireless fidelity) connection method, WIFI connection device, mobile terminal and system
US20170214679A1 (en) * 2016-01-23 2017-07-27 Verizon Patent And Licensing Inc. User-enabled, two-factor authentication service
CN108683679A (en) * 2018-05-30 2018-10-19 深圳壹账通智能科技有限公司 More account login methods, device, equipment and the storage medium of Web APP

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102299945A (en) * 2010-06-28 2011-12-28 中国联合网络通信集团有限公司 Gateway configuration page registration method, system thereof and portal certificate server
CN101977383A (en) * 2010-08-03 2011-02-16 北京星网锐捷网络技术有限公司 Authentication processing method, system, client side and server for network access
US20130298215A1 (en) * 2012-05-04 2013-11-07 Rawllin International Inc. Single sign-on user registration for online or client account services
CN104113837A (en) * 2013-04-22 2014-10-22 中兴通讯股份有限公司 Method and device for access authentication of wireless local area network
CN104519490A (en) * 2013-09-27 2015-04-15 中兴通讯股份有限公司 WIFI (wireless fidelity) connection method, WIFI connection device, mobile terminal and system
CN103856332A (en) * 2014-03-22 2014-06-11 中国科学院信息工程研究所 Implementation method of one-to-multiple account mapping binding of convenient and rapid multi-screen multi-factor WEB identity authentication
US20170214679A1 (en) * 2016-01-23 2017-07-27 Verizon Patent And Licensing Inc. User-enabled, two-factor authentication service
CN108683679A (en) * 2018-05-30 2018-10-19 深圳壹账通智能科技有限公司 More account login methods, device, equipment and the storage medium of Web APP

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112910978A (en) * 2021-01-26 2021-06-04 杭州迪普科技股份有限公司 Method and system for synchronizing network configuration data
CN112910978B (en) * 2021-01-26 2022-07-01 杭州迪普科技股份有限公司 Method and system for synchronizing network configuration data
CN115150831A (en) * 2022-06-16 2022-10-04 阿里云计算有限公司 Processing method, device, server and medium for network access request
CN116542662A (en) * 2023-05-06 2023-08-04 上海商睿智能科技有限公司 Off-line POS machine transaction method and system
CN117459326A (en) * 2023-12-25 2024-01-26 吉林信息安全测评中心 Network safety protection system
CN117459326B (en) * 2023-12-25 2024-03-08 吉林信息安全测评中心 Network safety protection system

Also Published As

Publication number Publication date
CN111031540B (en) 2022-08-23

Similar Documents

Publication Publication Date Title
CN111031540B (en) Wireless network connection method and computer storage medium
CN111177686B (en) Identity authentication method, device and related equipment
US11444932B2 (en) Device verification of an installation of an email client
KR102134302B1 (en) Wireless network access method and apparatus, and storage medium
US8266681B2 (en) System and method for automatic network logon over a wireless network
US9363249B2 (en) Secure simple enrollment
US9049184B2 (en) System and method for provisioning a unique device credentials
US20130174239A1 (en) Reinforced authentication system and method using context information at the time of access to mobile cloud service
BR102018074209A2 (en) SAFE METHOD FOR CONFIGURING DEALS OF INTERNET OF THINGS (IOT) THROUGH WIRELESS TECHNOLOGIES
US20100197293A1 (en) Remote computer access authentication using a mobile device
EP2879421B1 (en) Terminal identity verification and service authentication method, system, and terminal
US9154304B1 (en) Using a token code to control access to data and applications in a mobile platform
TW201706900A (en) Method and device for authentication using dynamic passwords
WO2022111187A1 (en) Terminal authentication method and apparatus, computer device, and storage medium
US20200351261A1 (en) Onboarding an unauthenticated client device within a secure tunnel
CN113556227B (en) Network connection management method, device, computer readable medium and electronic equipment
US9503442B1 (en) Credential-based application programming interface keys
EP3844929B1 (en) Non-3gpp device access to core network
US9443069B1 (en) Verification platform having interface adapted for communication with verification agent
US8498617B2 (en) Method for enrolling a user terminal in a wireless local area network
CN108886530B (en) Method for activating mobile device in enterprise mobile management and mobile device
EP2706717A1 (en) Method and devices for registering a client to a server
Matos et al. Secure hotspot authentication through a near field communication side-channel
US8949598B2 (en) Method and apparatus for secured embedded device communication
KR20130046781A (en) System and method for access authentication for wireless network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant