CN114915946A - Method and system for WIFI network access and sharing - Google Patents

Method and system for WIFI network access and sharing Download PDF

Info

Publication number
CN114915946A
CN114915946A CN202111624104.6A CN202111624104A CN114915946A CN 114915946 A CN114915946 A CN 114915946A CN 202111624104 A CN202111624104 A CN 202111624104A CN 114915946 A CN114915946 A CN 114915946A
Authority
CN
China
Prior art keywords
router
wifi network
identification
management platform
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111624104.6A
Other languages
Chinese (zh)
Inventor
孟陈融
李兴达
杨琛
黄思运
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianyi Shilian Technology Co ltd
Original Assignee
Tianyi Digital Life Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianyi Digital Life Technology Co Ltd filed Critical Tianyi Digital Life Technology Co Ltd
Priority to CN202111624104.6A priority Critical patent/CN114915946A/en
Publication of CN114915946A publication Critical patent/CN114915946A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Methods and systems for WiFi network access and sharing are disclosed. The method comprises the following steps: the first equipment accesses the WiFi network through the router and synchronizes the first equipment identification and the router identification to the router control management platform; the router control management platform issues an authorization identifier to the first device; the second equipment establishes NFC connection with the first equipment; and the second device accessing a WiFi network via the NFC connection and using the router identification and temporary key. The application also discloses a corresponding system.

Description

Method and system for WIFI network access and sharing
Technical Field
The present application relates to the field of wireless communications and terminals, and more particularly, to a method and system for secure and fast WiFi network access and sharing.
Background
With the wide application of WiFi communication technology in office and home scenarios, it is common to forget WiFi shared passwords, and to hide SSID (Service Set Identifier) by routers, which leads to the problem that WiFi cannot be found, so that WiFi cannot be shared frequently.
WiFi sharing is generally implemented in the art by informing the other party of an access password or code scanning. However, when the WiFi password is forgotten (which is common to many people), sharing is often impossible, and when the routing SSID is hidden, sharing of the WiFi network is even impossible, which causes inconvenience for the user. Therefore, how to implement sharing of WiFi networks in a shortcut has been a long pain point in the field.
While quick, safety is undoubtedly a more important consideration. If the private password is leaked, a hacker can easily invade the home network of the user through the network, so that a large amount of privacy of the user is leaked, and great trouble is caused to life.
Therefore, there is a great need in the art for methods and systems that can safely and quickly share WiFi network access.
Disclosure of Invention
The following presents a simplified summary of one or more aspects in order to provide a basic understanding of such aspects. This summary is not an extensive overview of all contemplated aspects, and is intended to neither identify key or critical elements of all aspects nor delineate the scope of any or all aspects. Its sole purpose is to present some concepts of one or more aspects in a simplified form as a prelude to the more detailed description that is presented later.
As described above, in the prior art, there are many problems with WiFi sharing and access. Therefore, the present application aims to provide a method and a system for sharing and accessing a WiFi network safely and quickly. By the method and the system, the device terminal which is not connected with the WiFi network can be quickly and safely accessed to use the WiFi network by touching the network device terminal which is connected with the WiFi network.
According to a first aspect of the present application, there is provided a method for WiFi network access and sharing, the method comprising:
the first equipment accesses the WiFi network through the router and synchronizes the first equipment identification and the router identification to the router control management platform;
the router control management platform sends the authorization identifier to the first device;
the second equipment establishes NFC connection with the first equipment; and
the second device accesses the WiFi network via the NFC connection and through the router identification and temporary key.
According to a preferred embodiment of the present application, the second device accessing the WiFi network via the NFC connection and through the router identification and the temporary key further comprises:
the first device acquires the second device identifier through the NFC connection;
the first device sends the second device identifier, the first device identifier and the authorization identifier to the router control management platform;
after receiving the first equipment identifier, the second equipment identifier and the authorization identifier, the router control management platform generates a temporary key and sends the temporary key to the first equipment and the router;
the first device sends the temporary secret key and the SSID of the WiFi network to the second device;
the second device accesses the WiFi network through the SSID and the temporary key.
According to a preferred embodiment of the present application, the authorization identifier is pre-stored in the NFC module of the first device.
According to the preferred embodiment of the present application, the router control management platform issues the temporary key to the router through the router identifier.
According to a preferred embodiment of the present application, the method further comprises: after the second device establishes the NFC connection with the first device, whether the second device wants to join a WiFi network is determined.
According to a second aspect of the present application, there is provided a system for WiFi network access and sharing for performing the method as described above, the system comprising:
a first device;
one or more second devices;
a router; and
the router controls the management platform.
To the accomplishment of the foregoing and related ends, the one or more aspects comprise the features hereinafter fully described and particularly pointed out in the claims. The following description and the annexed drawings set forth in detail certain illustrative features of the one or more aspects. These features are indicative, however, of but a few of the various ways in which the principles of various aspects may be employed and the present description is intended to include all such aspects and their equivalents.
Drawings
So that the manner in which the above recited features of the present application can be understood in detail, a more particular description of the disclosure briefly summarized above may be had by reference to aspects, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only certain typical aspects of this application and are therefore not to be considered limiting of its scope, for the description may admit to other equally effective aspects.
In the drawings:
fig. 1 is a flow diagram illustrating a method for WiFi network access and sharing according to an embodiment of the present application;
fig. 2 is a flow chart further illustrating in a method for WiFi network access and sharing according to an embodiment of the present application; and
fig. 3 is a schematic structural diagram illustrating a system for WiFi network access and sharing according to an embodiment of the present application.
Detailed Description
The detailed description set forth below in connection with the appended drawings is intended as a description of various configurations and is not intended to represent the only configurations in which the concepts described herein may be practiced. The detailed description includes specific details for the purpose of providing a thorough understanding of the various concepts. It will be apparent, however, to one skilled in the art that these concepts may be practiced without these specific details. In some instances, well known components are shown in block diagram form in order to avoid obscuring such concepts.
It is to be understood that other embodiments will be evident based on the present disclosure, and that system, structural, process, or mechanical changes may be made without departing from the scope of the present disclosure.
With reference to fig. 1 and 2, aspects are described with reference to one or more components and one or more methods that may perform the actions or functions described herein. In an aspect, the term "component" as used herein may be one of the parts that make up a system, may be hardware or software or some combination thereof, and may be divided into other components. While the operations described below in fig. 2 are presented in a particular order and/or as performed by example components, it should be understood that the order of the actions, as well as the components performing the actions, may vary depending on the implementation. Further, it should be understood that the following acts or functions may be performed by a specially programmed processor, a processor executing specially programmed software or computer readable media, or by any other combination of hardware components and/or software components capable of performing the described acts or functions.
As mentioned above, for shared access of WiFi, shortcut and security are aspects that must both need to be considered uniformly.
A flow diagram for a WiFi network access and sharing method according to an embodiment of the present application is illustrated in fig. 1.
As shown in fig. 1, the secure and fast WiFi network access and sharing method 100 mainly includes the following steps.
The first device performs WiFi network access through the SSID and the WiFi network key and synchronizes messages to the router control management platform (step 101), thereby triggering a trust authorization authentication event. These messages mainly include: an identification of the router to which the device is connected, and an identification of the first device itself, etc.
The router control management platform then returns an authorization identifier to the first device and pre-stores the authorization identifier in the NFC module of the first device (step 102).
When the second device needs to join the WiFi network, the second device touches the first device to establish connection with the first device through the NFC module (step 103).
The second device connects through the NFC and triggers a shared access event to access the WiFi network using the authorized identifier of the first device (step 104).
A detailed description of step 104 (200) for a WiFi network access and sharing method according to an embodiment of the present application is further illustrated in fig. 2. Step 104 mainly includes the following substeps.
First, the first device acquires the device identifier of the second device through the NFC connection and synchronously initiates a sharing access request to the router control management platform (step 201).
Second, the second device identification, the first device identification, and the authorized identification of the first device are sent to the router control management platform (step 202).
Thirdly, after receiving the first device identifier, the second device identifier and the authorization identifier, the router control management platform generates a temporary key, and sends the temporary key to the first device and the router to which the first device is connected (step 203).
Fourthly, the first device sends the temporary key issued by the router control management platform and the SSID connected with the WiFi to the second device through the NFC connection (step 204).
Fifth, the second device receives the SSID and the ephemeral key of the current WiFi network through the NFC connection and accesses the WiFi network using the SSID and the ephemeral key (step 205).
Specifically, the second device invokes WiFi access to initiate a request to the router, which completes access authentication and closes the shared access event.
A schematic structural diagram for a WiFi network access and sharing system 300 according to an embodiment of the present application is illustrated in fig. 3.
As shown in fig. 3, the system 300 mainly includes the following components.
The first device 301 is a device that performs WiFi network access through an SSID of a WiFi network and a key preset by a router. As can be appreciated by those skilled in the art, the first device includes a device wireless access module and an NFC module.
One or more second devices 302, i.e., devices that currently need access to the WiFi network. As can be appreciated by those skilled in the art, the second device also includes a device wireless access module and an NFC module.
Router 303, i.e., a wireless access point hardware device.
A router control management platform 304, which is mainly used to manage and configure various network access information.
As described above with respect to the method, the first device 301 first joins the current WiFi network with the SSID and WiFi network key preset by its router 303, while synchronizing the message to the router control management platform 304, thereby triggering a trust authority authentication event.
These messages mainly include: an identification of the router to which the device is connected, and an identification of the first device itself, etc.
The router control management platform 304 then returns an authorization identifier (i.e., an identifier for authenticating that the first device 301 is a legitimate access device) to the first device 301, and pre-stores the authorization identifier in the NFC module of the first device 301.
Next, when the second device 302 needs to join the WiFi network, an NFC connection is established with the first device 301 through its respective NFC module.
After the connection, the first device 301 acquires the device identifier of the second device 302 through the NFC connection and sends the second device identifier, the first device identifier, and the authorization identifier of the first device to the router control management platform 304.
After receiving the identifier, the router control and management platform 304 generates a temporary key, and sends the temporary key to the first device 301 and the router 303 to which the first device is connected.
Thereafter, the first device 301 sends the temporary key issued by the router control management platform 304 and the SSID of the current WiFi to the second device 302.
Finally, the second device 302 can successfully access the network via the SSID of the current WiFi network and the temporary secret key.
By adopting the WiFi access and sharing system according to the embodiment of the application, the non-connected WiFi network device (second device) can smoothly access the current network without knowing a network key through the connection of the connected WiFi network device (first device). On one hand, the private network key cannot be leaked, so that the privacy and the network security of a user are better protected; on the other hand, the current network password and any information do not need to be remembered at all times, the network can be accessed quickly only through NFC connection, and the user experience is good.
Compared with the prior art, the WiFi sharing access method and system have the following advantages.
Firstly, the application realizes noninductive and rapid access of the WiFi network of the unconnected device by the integral system and the method through the light touch and NFC connection between the connected WiFi device and the unconnected WiFi device through the NFC functional module of the wireless terminal, so that the wireless terminal has great convenience and convenience;
secondly, based on the fact that the WiFi equipment and the router which are connected control the management platform to trust to register and issue the authorized identification, the router can be linked to carry out configuration, the WiFi equipment which is not connected adopts the temporary secret key to access authentication, and therefore the safety of the network is greatly improved.
Aspects, elements, or any portion of an element, or any combination of elements according to the present disclosure may be implemented with a "processing system" that includes one or more processors. Examples of processors include: microprocessors, microcontrollers, Digital Signal Processors (DSPs), Field Programmable Gate Arrays (FPGAs), Programmable Logic Devices (PLDs), state machines, gated logic, discrete hardware circuits, and other suitable hardware configured to perform the various functionalities described throughout this disclosure. One or more processors in the processing system may execute software. Software should be construed broadly to mean instructions, instruction sets, code segments, program code, programs, subprograms, software modules, applications, software packages, routines, subroutines, objects, executables, threads of execution, procedures, functions, etc., whether referred to in software, firmware, middleware, microcode, hardware description language, or other terminology. The software may reside on a computer readable medium. The computer readable medium may be a non-transitory computer readable medium. By way of example, a non-transitory computer-readable medium comprises: magnetic storage devices (e.g., hard disk, floppy disk, magnetic strips), optical disks (e.g., Compact Disk (CD), Digital Versatile Disk (DVD)), smart cards, flash memory devices (e.g., memory card, memory stick, key drive), Random Access Memory (RAM), Read Only Memory (ROM), programmable ROM (prom), erasable prom (eprom), electrically erasable prom (eeprom), registers, removable disk, and any other suitable medium for storing software and/or instructions that may be accessed and read by a computer. By way of example, computer-readable media may also include carrier waves, transmission lines, and any other suitable media for conveying software and/or instructions that may be accessed and read by a computer. The computer readable media may reside in a processing system, external to the processing system, or distributed across multiple entities including the processing system. The computer readable medium may be embodied in a computer program product. By way of example, a computer program product may include a computer-readable medium in packaging material. Those skilled in the art will recognize how best to implement the described functionality presented throughout this disclosure, depending on the particular application and the overall design constraints imposed on the overall system.
It is to be understood that the specific order or hierarchy of steps in the methods disclosed is an illustration of exemplary processes. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the methods or methodologies described herein may be rearranged. The accompanying method claims present elements of the various steps in a sample order, and are not meant to be limited to the specific order or hierarchy presented unless specifically recited herein.
The previous description is provided to enable any person skilled in the art to practice the various aspects described herein. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects. Thus, the claims are not intended to be limited to the aspects shown herein, but is to be accorded the full scope consistent with the language claims, wherein reference to an element in the singular is not intended to mean "one and only one" (unless specifically so stated) but rather "one or more". The term "some" means one or more unless specifically stated otherwise. A phrase referring to "at least one of a list of items refers to any combination of those items, including a single member. By way of example, "at least one of a, b, or c" is intended to encompass: at least one a; at least one b; at least one c; at least one a and at least one b; at least one a and at least one c; at least one b and at least one c; and at least one a, at least one b, and at least one c. All structural and functional equivalents to the elements of the various aspects described throughout this disclosure that are known or later come to be known to those of ordinary skill in the art are expressly incorporated herein by reference and are intended to be encompassed by the claims. Moreover, nothing disclosed herein is intended to be dedicated to the public regardless of whether such disclosure is explicitly recited in the claims.

Claims (10)

1. A method for WiFi network access and sharing, the method comprising:
the first equipment accesses the WiFi network through the router and synchronizes the first equipment identification and the router identification to the router control management platform;
the router control management platform issues an authorization identifier to the first device;
the second equipment establishes NFC connection with the first equipment; and
the second device accesses a WiFi network via the NFC connection and through the router identification and temporary key.
2. The method of claim 1, wherein the second device accessing a WiFi network via the NFC connection and through the router identification and temporary key further comprises:
the first device acquires the second device identification through the NFC connection;
the first device sends the second device identification, the first device identification and the authorization identification to the router control management platform;
the router control management platform generates a temporary key after receiving the first equipment identifier, the second equipment identifier and the authorization identifier, and sends the temporary key to the first equipment and the router;
the first device sends the temporary secret key and the SSID of the WiFi network to the second device;
the second device accesses a WiFi network through the SSID and the temporary key.
3. A method as claimed in claim 1 or 2, wherein the authorisation identification is pre-stored in an NFC module of the first device.
4. The method of claim 2, wherein the router control management platform issues the temporary key to the router via the router identification.
5. The method of claim 1 or 2, wherein the method further comprises:
after the second device establishes the NFC connection with the first device, whether the second device wants to join a WiFi network is determined.
6. A system for WiFi network access and sharing for performing the method of any one of claims 1 to 5, the system comprising:
a first device;
one or more second devices;
a router; and
the router controls the management platform.
7. The system of claim 6, wherein the second device accessing a WiFi network via the NFC connection and through the router identification and temporary key further comprises:
the first device acquires the second device identification through the NFC connection;
the first device sends the second device identification, the first device identification and the authorization identification to the router control management platform;
after receiving the first equipment identifier, the second equipment identifier and the authorization identifier, the router control management platform generates a temporary key and sends the temporary key to the first equipment and the router;
the first device sends the temporary secret key and an SSID of a WiFi network to the second device;
the second device accesses a WiFi network through the SSID and the temporary key.
8. A system as claimed in claim 6 or 7, wherein the authorisation identification is pre-stored in an NFC module of the first device.
9. The method of claim 7, wherein the router control management platform issues the temporary key to the router via the router identification.
10. The system of claim 6 or 7, further comprising:
after the second device establishes the NFC connection with the first device, whether the second device wants to join a WiFi network is determined.
CN202111624104.6A 2021-12-28 2021-12-28 Method and system for WIFI network access and sharing Pending CN114915946A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111624104.6A CN114915946A (en) 2021-12-28 2021-12-28 Method and system for WIFI network access and sharing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111624104.6A CN114915946A (en) 2021-12-28 2021-12-28 Method and system for WIFI network access and sharing

Publications (1)

Publication Number Publication Date
CN114915946A true CN114915946A (en) 2022-08-16

Family

ID=82763393

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111624104.6A Pending CN114915946A (en) 2021-12-28 2021-12-28 Method and system for WIFI network access and sharing

Country Status (1)

Country Link
CN (1) CN114915946A (en)

Similar Documents

Publication Publication Date Title
KR101904338B1 (en) Method and apparatus for user authentication and human intention verification in a mobile device
US10666642B2 (en) System and method for service assisted mobile pairing of password-less computer login
CN108173822B (en) Intelligent door lock control method, intelligent door lock and computer readable storage medium
US11375363B2 (en) Secure updating of telecommunication terminal configuration
EP3800909B1 (en) Remote management method, and device
CN110855621B (en) Method for controlling access to an in-vehicle wireless network
US10349272B2 (en) Virtual SIM card cloud platform
KR101651808B1 (en) Network assisted fraud detection apparatus and methods
EP2630816B1 (en) Authentication of access terminal identities in roaming networks
CN102204304B (en) Support of multiple pre-shared keys in access point
CA3038884C (en) Protecting mobile devices from unauthorized device resets
US9686399B2 (en) Protection of a wireless communications device against unauthorized use
KR20160114620A (en) Methods, devices and systems for dynamic network access administration
CN106559213B (en) Equipment management method, equipment and system
CN113785607A (en) Remote secure unlocking
CN108664805B (en) Application program safety verification method and system
CN114915946A (en) Method and system for WIFI network access and sharing
CN108432201B (en) Electronic device including a security module supporting a local management mode for subscriber profile configuration
CA2994784A1 (en) Method and communication system for secured and automated communication
CN105404820A (en) File security access system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20240321

Address after: Unit 1, Building 1, China Telecom Zhejiang Innovation Park, No. 8 Xiqin Street, Wuchang Street, Yuhang District, Hangzhou City, Zhejiang Province, 311100

Applicant after: Tianyi Shilian Technology Co.,Ltd.

Country or region after: Zhong Guo

Address before: Room 1423, No. 1256 and 1258, Wanrong Road, Jing'an District, Shanghai 200072

Applicant before: Tianyi Digital Life Technology Co.,Ltd.

Country or region before: Zhong Guo

TA01 Transfer of patent application right