WO2015127734A1 - Wifi热点连接及选择方法、通信终端及系统 - Google Patents

Wifi热点连接及选择方法、通信终端及系统 Download PDF

Info

Publication number
WO2015127734A1
WO2015127734A1 PCT/CN2014/080565 CN2014080565W WO2015127734A1 WO 2015127734 A1 WO2015127734 A1 WO 2015127734A1 CN 2014080565 W CN2014080565 W CN 2014080565W WO 2015127734 A1 WO2015127734 A1 WO 2015127734A1
Authority
WO
WIPO (PCT)
Prior art keywords
verification information
communication terminal
module
wifi hotspot
wifi
Prior art date
Application number
PCT/CN2014/080565
Other languages
English (en)
French (fr)
Inventor
张跃龙
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to EP14883598.6A priority Critical patent/EP3113528B1/en
Priority to US15/121,764 priority patent/US20170094692A1/en
Priority to AU2014384393A priority patent/AU2014384393B2/en
Publication of WO2015127734A1 publication Critical patent/WO2015127734A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • WIFI hotspot connection and selection method communication terminal and system
  • the present invention relates to the field of communications, and in particular, to a WIFI hotspot connection and selection method, a communication terminal and a system. Background technique
  • the unencrypted WIFI hotspot provided by the operator is actually a kind of paid network service provided by the operator. After the connection, you need to perform secondary authentication on the operator's page before you can actually access the WIFI hotspot provided by the Internet merchant. You do not need to perform secondary authentication. After connecting, you can directly access the Internet and because of the strength of the operator. Better than merchants, so in many cases, the signal quality of the operator's unencrypted WIFI hotspot is stronger than the unencrypted WIFI hotspot provided by the merchant.
  • the embodiments of the present invention provide a WIFI hotspot connection and selection method, a communication terminal, and a system.
  • an embodiment of the present invention provides a WIFI hotspot connection method, and a package Includes:
  • the communication terminal is connected to an unencrypted WIFI hotspot
  • the communication terminal sends preset verification information to the network server;
  • the communication terminal receives the verification information fed back by the network server, and compares with the locally preset verification information, and maintains a connection with the WIFI hotspot when the two are consistent.
  • the method when the communication terminal determines that the verification information fed back by the network server is inconsistent with the local verification information, the method further includes:
  • the communication terminal reselects and connects to an unencrypted WIFI hotspot; or the communication terminal reselects and connects to the unencrypted WIFI hotspot after deleting the WIFI hotspot from the unencrypted WIFI hotspot list; or ,
  • the communication terminal directly exits the WIFI connection.
  • the method before the communication terminal is connected to an unencrypted WIFI hotspot, the method further includes:
  • the operator WIFI hotspot in the unencrypted WIFI hotspot searched by the communication terminal is removed according to the preset operator WIFI hotspot information.
  • the method before the communications terminal sends the preset authentication information to the network server, the method further includes:
  • the communication terminal encrypts the verification information to be sent; and/or,
  • the method further includes:
  • the embodiment of the present invention further provides a WIFI hotspot selection method, including:
  • the communication terminal is connected to an unencrypted WIFI hotspot
  • the communication terminal sends preset verification information to the network server, where the network server pre Have verification information;
  • the communication terminal receives the verification information fed back by the network server, and compares with the locally preset verification information, and maintains a connection with the WIFI hotspot when the two are consistent.
  • the method when the network server determines that the verification information sent by the communication terminal is inconsistent with the locally preset verification information, or when the communication terminal determines the verification information fed back by the network server When the local preset verification information is inconsistent, the method further includes:
  • the communication terminal reselects and connects to an unencrypted WIFI hotspot; or the communication terminal reselects and connects to the unencrypted WIFI hotspot after deleting the WIFI hotspot from the unencrypted WIFI hotspot list; or ,
  • the communication terminal directly exits the WIFI connection.
  • the method before the communications terminal sends the preset authentication information to the network server, the method further includes:
  • the method further includes: decrypting the received verification information.
  • the method before the network server feeds back the verification information, the method further includes:
  • the network server encrypts the verification information to be sent
  • the method further includes: decrypting the received verification information.
  • the communication terminal encrypts the verification information to be transmitted into binary verification data information.
  • the network server encrypts the verification information to be transmitted into binary verification data information.
  • the embodiment of the present invention further provides a communication terminal, including a WIFI communication module, a first sending module, a first receiving module, and a first processing module;
  • the WIFI communication module is configured to connect to an unencrypted WIFI hotspot
  • the first sending module is configured to send, to the network server, verification information preset locally by the communication terminal;
  • the first receiving module is configured to receive the verification information fed back by the network server; the first processing module is configured to: the verification information received by the first receiving module and the verification preset locally by the communication terminal The information is compared, and the connection between the WIFI communication module and the WIFI hotspot is maintained when the two are consistent.
  • the communication terminal further includes a reselection module, where the reselection module is configured to determine, at the first processing module, verification information received by the first receiving module and the communication When the verification information of the terminal local preset is inconsistent, reselect an unencrypted WIFI hotspot to connect with the WIFI communication module; or delete the WIFI hotspot from the unencrypted WIFI hotspot list, and then select an unencrypted WIFI hotspot. Connected to the WIFI communication module.
  • the communication terminal further includes a selection module, configured to: before the WIFI communication module selects and connects an unencrypted WIFI hotspot, according to the preset operator WIFI hotspot information, the WIFI The operator WIFI hotspot in the unencrypted WIFI hotspot searched by the communication module is removed.
  • the communication terminal further includes a first encryption module and a first decryption module, where the first encryption module is configured to send the verification information to the first sending module Before the web server encrypts the authentication information to be sent; and/or,
  • the first decryption module is configured to connect the first receiving module to the first processing module Before the received verification information is compared with the verification information preset by the communication terminal, the verification information received by the first receiving module is decrypted.
  • an embodiment of the present invention further provides a communication system, including a communication terminal and a network server;
  • the communication terminal includes a WIFI communication module, a first sending module, a first receiving module, and a first processing module;
  • the network server includes a second receiving module, a second sending module, and a second processing module;
  • the WIFI communication module is configured to select and connect an unencrypted WIFI hotspot;
  • the first sending module is configured to send the preset information preset by the communication terminal to the second receiving module;
  • the second receiving module is configured to receive the verification information sent by the first sending module, where the second processing module is configured to verify the verification information received by the second receiving module and the network server preset preset The information is compared, and when the two are consistent, the second sending module sends the verification information to the first receiving module;
  • the first receiving module is configured to receive the verification information sent by the second sending module; the first processing module is configured to: the verification information received by the first receiving module and the preset preset by the communication terminal The verification information is compared, and when the two are consistent, the connection between the WIFI communication module and the WIFI hotspot is maintained.
  • the communication terminal further includes: a first encryption module and a first decryption module, the network server further includes a second decryption module and a second encryption module; wherein, the first encryption The module is configured to encrypt the verification information to be sent before the first sending module sends the verification information to the network server;
  • the first decryption module is configured to: before the first processing module compares the verification information received by the first receiving module with the verification information preset by the communication terminal locally, before the first receiving The verification information received by the module is decrypted;
  • the second decryption module is configured to receive, before the second processing module compares the verification information received by the second receiving module with the verification information preset by the network server, the second receiving module The verification information obtained is decrypted;
  • the second encryption module is configured to perform encryption processing on the verification information to be sent before the second sending module sends the verification information to the communication terminal.
  • an embodiment of the present invention further provides a computer storage medium, where the computer storage medium includes a set of instructions, when the instruction is executed, causing at least one processor to execute the WIFI hotspot selection method.
  • the WIFI hotspot connection and selection method, the communication terminal and the system provided by the embodiment of the present invention selects and connects an unencrypted WIFI hotspot; sends the preset verification information to the network server, and the network server also presets the verification information; After receiving the verification information, the server compares with the locally preset verification information, and feeds back the verification information to the communication terminal when the two are consistent; the communication terminal receives the verification information fed back by the network server and compares with the locally preset verification information, For a while, it indicates that the currently connected WIFI hotspot is a hotspot that does not require secondary authentication, and maintains a connection with the WIFI hotspot.
  • the communication terminal in the embodiment of the present invention automatically filters the WIFI hotspots that need to be verified twice in the unencrypted WIFI hotspot by using the preset verification information, and does not require the user to manually perform verification and selection, thereby simplifying the WIFI communication.
  • the operation process greatly improves the satisfaction of the user experience.
  • FIG. 1 is a schematic flowchart of a WIFI hotspot selection method according to Embodiment 1 of the present invention
  • 2 is a schematic structural diagram of a communication system according to Embodiment 2 of the present invention
  • FIG. 3 is a schematic structural diagram 1 of a communication terminal according to Embodiment 2 of the present invention.
  • FIG. 4 is a schematic structural diagram 1 of a network server according to Embodiment 2 of the present invention.
  • FIG. 5 is a schematic structural diagram 2 of a communication terminal according to Embodiment 2 of the present invention.
  • FIG. 6 is a schematic structural diagram 3 of a communication terminal according to Embodiment 2 of the present invention.
  • FIG. 7 is a schematic structural diagram 2 of a network server according to Embodiment 2 of the present invention.
  • FIG. 8 is a schematic flowchart of a WIFI hotspot selection method in application scenario 1 according to Embodiment 3 of the present invention.
  • FIG. 9 is a flow chart showing the process of processing the verification information by the network server in FIG. 8 according to an embodiment of the present invention.
  • FIG. 10 is a schematic flowchart of a WIFI hotspot selection method in application scenario 2 according to Embodiment 3 of the present invention.
  • FIG. 11 is a schematic flowchart of a WIFI hotspot selection method in application scenario 3 according to Embodiment 3 of the present invention. detailed description
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • the WIFI hotspot selection method includes the following steps: Step 101: The communication terminal selects and connects an unencrypted WIFI hotspot;
  • Step 102 The communication terminal sends preset verification information to the network server, where the network server presets the verification information.
  • Step 103 The network server receives the verification information sent by the communication terminal, and compares it with the locally preset verification information, and feeds back the verification information to the communication terminal when the two are consistent;
  • Step 104 The communication terminal receives the verification information fed back by the network server, and compares with the locally preset verification information, and when the two are consistent, it indicates that the WIFI hotspot currently connected by the communication terminal does not need to be To be authenticated twice, keep the communication terminal connected to the WIFI hotspot.
  • the communication terminal in this embodiment automatically filters the WIFI hotspots that need to be verified twice in the unencrypted WIFI hotspot through the preset verification information, and does not require the user to manually perform verification and selection, thereby simplifying the operation of the WIFI communication.
  • the process greatly improves the satisfaction of the user experience.
  • the communication terminal is prevented from erroneously accessing the unencrypted WIFI hotspot provided by the operator that requires secondary verification, thereby reducing the user's economic expenditure and further improving the satisfaction of the user experience.
  • the communication terminal in the above step 101 may be a terminal device having a WIFI communication function such as a mobile phone or an IPAD; the method for selecting a WIFI hotspot may be any one of the following manners: Method 1: The communication terminal searches for an unencrypted WIFI hotspot to obtain no Encrypt the WIFI hotspot list, and then select one from the WIFI hotspot list to connect; when selecting, you can select a WIFI hotspot with the best signal quality, or you can select according to the order specified by the user, or even randomly select from the WIFI hotspot list. a WIFI hotspot, etc.;
  • Method 2 Search for the corresponding WIFI hotspot directly according to the WIFI hotspot information typed by the user, and connect.
  • step 103 when the network server determines that the verification information sent by the communication terminal is inconsistent with the locally preset verification information; the network server may notify the communication terminal to reselect an unencrypted WIFI hotspot and connect, and then proceeds to step 102; An unencrypted WIFI hotspot that does not require secondary verification, or no remaining unencrypted WIFI hotspots.
  • step 104 when the communication terminal determines that the verification information fed back by the network server is inconsistent with the local verification information, it reselects and connects to an unencrypted WIFI hotspot. Then proceed to step 102 until an unencrypted WIFI hotspot that does not require secondary verification is selected, or there are currently no remaining unencrypted WIFI hotspots.
  • the communication terminal may first remove the currently verified WIFI hotspot from the unencrypted WIFI hotspot list, and then reselect and connect to the one from the list. Encrypted WIFI hotspot; in some application scenarios Next, the communication terminal can directly exit the WIFI connection, for example, if there is only one current unencrypted WIFI hotspot.
  • the step of culling the operator WIFI hotspot may be further included to improve the success rate of the subsequent verification.
  • the operator WIFI hotspot in the unencrypted WIFI hotspot searched by the communication terminal may be removed according to the preset operator WIFI hotspot information.
  • the WIFI hotspot information (such as a name, etc.) provided by each operator may be preset, and may be preset locally in the communication terminal, or may be preset on another device that the communication terminal can communicate to obtain information, and then After completing the unencrypted WIFI hotspot search to obtain the unencrypted WIFI hotspot list, the communication terminal removes the operator WIFI hotspot from the list according to the preset operator WIFI hotspot information.
  • the verification information to be sent may be encrypted before the verification information is sent to the other party.
  • the communication terminal encrypts the verification information to be transmitted before transmitting the verification information to the network server; and/or in the above step 103, the network server treats the verification information before transmitting the verification information to the communication terminal.
  • the verification information sent is encrypted.
  • the communication terminal and/or the network server further includes a process of decrypting the received verification information before comparing the received verification information with the locally preset verification information.
  • the specific encryption and decryption algorithm may be selected according to a specific application scenario, and details are not described herein again.
  • the communication terminal and/or the network server encrypts the verification information to be transmitted into binary verification data information.
  • the verification information may theoretically be any data information that plays a role of distinguishing and identifying; in order to ensure the security and reliability of the information, the specific format and content may be set according to specific application scenarios.
  • Embodiment 2 :
  • This embodiment provides a communication system, as shown in FIG. 2, which includes a communication terminal 21 and The network server 22; wherein, as shown in FIG. 3 and FIG. 4 respectively, the communication terminal includes a WIFI communication module 211, a first sending module 212, a first receiving module 213, and a first processing module 214; and the network server includes a second receiving module. 221, a second sending module 222, and a second processing module 223;
  • the WIFI communication module 211 of the communication terminal is configured to select and connect an unencrypted WIFI hotspot; the method for selecting the WIFI hotspot may be any one of the following methods:
  • Method 1 The communication terminal searches for the unencrypted WIFI hotspot to obtain the unencrypted WIFI hotspot list, and then selects one of the WIFI hotspot lists to connect; when selecting, the WIFI hotspot with the best signal quality can be selected, or according to the order specified by the user. Select, you can even randomly select a WIFI hotspot from the list of WIFI hotspots, etc.
  • Method 2 Search for the corresponding WIFI hotspot directly according to the WIFI hotspot information typed by the user, and connect.
  • the first sending module 212 of the communication terminal is configured to send the verification information locally preset by the communication terminal to the network server after the WIFI hotspot is connected to an unencrypted WIFI hotspot;
  • the second receiving module 221 of the network server is configured to receive the authentication information sent by the first sending module 212.
  • the second processing module 223 of the network server is configured to compare the verification information received by the second receiving module 221 with the verification information preset by the network server, and send the verification to the communication terminal by using the second sending 223 module when the two are consistent.
  • the first receiving module 213 of the communication terminal is configured to receive the verification information sent by the second sending module 223;
  • the first processing module 214 of the communication terminal is configured to compare the verification information received by the first receiving module 213 with the locally preset verification information, and when the two are consistent, indicate that the WIFI hotspot is currently connected to the unencrypted WIFI hotspot. The second verification is not required, and the connection between the WIFI communication module 211 and the WIFI hotspot is maintained.
  • the communication terminal may further include a reselection module configured to be in the pass
  • the first processing module 214 of the signaling terminal determines that the authentication information received by the first receiving module 213 is inconsistent with the authentication information preset by the communication terminal, and reselects an unencrypted WIFI hotspot to be connected to the ⁇ 1?1 communication module 211. Or after the currently connected WIFI hotspot is deleted from the unencrypted WIFI hotspot list, an unencrypted WIFI hotspot is reselected and connected to the WIFI communication module 211.
  • the communication terminal in this embodiment further includes a screening module 215, configured to remove the WIFI hotspot of the operator before the WIFI communication module selects and connects an unencrypted WIFI hotspot. Improve the success rate of subsequent verification.
  • the screening module 215 may remove the operator WIFI hotspot in the unencrypted WIFI hotspot searched by the communication terminal according to the preset operator WIFI hotspot information.
  • the WIFI hotspot information (such as a name, etc.) provided by each operator may be preset, and may be preset locally in the communication terminal, or may be preset on another device that the communication terminal can communicate to obtain information, and then After completing the unencrypted WIFI hotspot search to obtain the unencrypted WIFI hotspot list, the communication terminal removes the operator WIFI hotspot from the list according to the preset operator WIFI hotspot information.
  • the communication terminal in this embodiment may further include a first encryption module 216 and a first decryption module 217, and the first encryption module 216 is configured to be in communication.
  • the first sending module 212 of the terminal encrypts the verification information to be sent before transmitting the verification information to the network server.
  • the first decryption module 217 is configured to receive the first receiving module 211 of the communication terminal at the first processing module 214. Before the verification information is compared with the verification information preset by the communication terminal, the verification information received by the first receiving module 211 is decrypted.
  • the network server in this embodiment further includes a second decryption module 224 and a second encryption module 225; the second decryption module 224 is configured to be second in the second processing module 223 of the network server.
  • the verification information received by the receiving module 221 is compared with the verification information preset by the network server, the verification information received by the second receiving module 221 is decrypted; the second encryption module 225 is configured to be the second sending in the network server.
  • the module 222 Before transmitting the verification information to the communication terminal, the module 222 performs encryption processing on the verification information to be sent.
  • the first encryption module 216 and the second encryption module 224 in this embodiment may specifically encrypt the verification information to be transmitted into binary verification data information to further ensure the security of the transmission process.
  • the specific encryption algorithm can be selected according to the specific application scenario.
  • the WIFI communication module 211 can be combined by a central processing unit (CPU), a digital signal processor (DSP) or a Field-Programmable Gate Array (FPGA) in the communication terminal.
  • the first transmitting module 212 can be implemented by a transmitter in the communication terminal, and the first receiving module 213, the first encrypting module 216, and the first decrypting module 217 can be implemented by a receiver in the communication terminal, and the first processing module 214, reselecting
  • the module and the screening module 215 can be implemented by a CPU, a DSP or an FPGA in the communication terminal, and the reselection module can be implemented by a CPU, a DSP or an FPGA in the communication terminal;
  • the second receiving module 221 can be implemented by a receiver in the network server, and the second sending module
  • the 222 can be implemented by a transmitter in the network server, and the second processing module 223, the second decryption module 224, and the second encryption module 225 can be implemented by a
  • Embodiment 3 is a diagrammatic representation of Embodiment 3
  • the single unencrypted WIFI hotspot may be specified by the user, or may only be currently searched for an unencrypted WIFI hotspot or the like. please Referring to Figure 8, it includes the following steps:
  • Step 801 The communication terminal is connected to the unencrypted WIFI hotspot
  • Step 802 The communication terminal encrypts the verification information to be sent, and encrypts the verification information into binary verification data information.
  • a 1024-bit RSA port key may be specifically used;
  • Step 803 The communication terminal sends the encrypted verification information to the corresponding network server.
  • Step 804 The network server performs verification processing on the received verification information, and feeds back to the communication terminal when verifying that the verification information is consistent with the locally preset verification information. Encrypted authentication information;
  • Step 805 The communication terminal receives the verification information sent by the network server.
  • Step 806 The communication terminal decrypts the received verification information.
  • Step 807 The communication terminal compares the decrypted verification information with the locally preset verification information.
  • Step 808 The communication terminal determines whether the two are consistent, and if so, transposes step 809; otherwise, ends the process.
  • Step 809 Maintain a connection with the WIFI hotspot.
  • the network server performs a verification process on the received verification information, as shown in FIG. 9, and includes:
  • Step 8041 Receive binary verification data information sent by the communication terminal.
  • Step 8042 Determine whether the reception is successful, if yes, go to step 8043, otherwise, end the processing flow;
  • Step 8043 Decrypt the received binary verification data information.
  • Step 8044 Compare the decrypted verification information with the locally preset verification information.
  • Step 8045 Determine whether the two are consistent. If yes, go to step 8046, otherwise, end the processing flow;
  • Step 8046 Encrypt the local preset verification information, which may be encrypted and encrypted into binary verification data information by using a 1024-bit RSA encryption algorithm.
  • Step 8047 Send the encrypted verification information to the communication terminal.
  • Step 1001 The communication terminal searches for and saves the unencrypted WIFI hotspot, and obtains a list of unencrypted WIFI hotspots;
  • Step 1002 The communication terminal selects an unencrypted WIFI hot spot from the unencrypted WIFI hotspot list to connect, and specifically selects the best WIFI hotspot to connect; of course, it can also be selected according to other rules set by the user;
  • Step 1003 The communication terminal performs data encryption on the verification information to be sent, and encrypts the verification information to be sent into binary verification data information.
  • Step 1004 The communication terminal sends the encrypted verification information to the corresponding network server.
  • Step 1005 The communication terminal determines whether the verification information is successfully sent. If yes, go to the step
  • Step 1006 The network server performs verification processing on the received verification information, and feeds back the encrypted verification information to the communication terminal when verifying the verification information that is locally preset.
  • Step 1007 The communication terminal receives the verification information sent by the network server. ;
  • Step 1008 The communication terminal determines whether the verification information is successfully received. If yes, go to the step
  • Step 1009 The communication terminal decrypts the received verification information.
  • Step 1010 The communication terminal compares the decrypted verification information with the locally preset verification information.
  • Step 1011 The communication terminal determines whether the two are consistent, if yes, transpose step 1012; otherwise, Go to step 1013;
  • Step 1012 Maintain a connection with the WIFI hotspot
  • Step 1013 Delete the currently connected WIFI hotspot
  • Step 1014 Determine whether there is no WIFI hotspot remaining in the unencrypted WIFI hotspot list, and if yes, transpose step 1002; otherwise, end the processing flow.
  • the process of performing the verification process on the received authentication information by the network server in the above step 1006 is similar to the process shown in FIG. 9, and details are not described herein again.
  • the unencrypted WIFI hotspots searched by the communication terminal are often multiple; the multiple unencrypted WIFI hotspots may include WIFI hotspots provided by the operator for secondary verification, including other businesses. WIFI hotspots that do not require secondary verification. Therefore, the WIFI hotspot provided by the merchant in the unencrypted WIFI hotspot can be first removed, and then the subsequent connection and verification process can be performed, which can improve the success rate of the verification.
  • the communication terminal selects to connect to the WIFI hotspot, the communication terminal can connect to the WIFI hotspot designated by the user.
  • Figure 11 The following process is illustrated by this example, as shown in Figure 11, which includes:
  • Step 1101 The communication terminal searches for and saves only the unencrypted WIFI hotspot of the non-operator name, and obtains an unencrypted WIFI hotspot list;
  • Step 1102 The communication terminal connects to the first unencrypted WIFI hotspot in the order specified by the user; of course, it may also be selected according to other rules set by the user;
  • Step 1103 The communication terminal encrypts the verification information to be sent, and encrypts the verification information to be sent into binary verification data information.
  • a 128-bit AES algorithm may be specifically used, and of course, other encryption algorithms may be used;
  • Step 1104 The communication terminal sends the encrypted verification information to the corresponding network server.
  • Step 1105 The communication terminal determines whether the verification information is successfully sent. If yes, go to step 1106, otherwise, transpose step 1113;
  • Step 1106 The network server performs verification processing on the received verification information, and feeds back the encrypted verification information to the communication terminal when the verification is consistent with the verification information preset locally;
  • Step 1107 The communication terminal receives the verification information sent by the network server. ;
  • Step 1108 The communication terminal determines whether the verification information is successfully received. If yes, go to step 1109, otherwise, transpose step 1113;
  • Step 1109 The communication terminal decrypts the received verification information.
  • Step 1110 The communication terminal compares the decrypted verification information with the locally preset verification information.
  • Step 1111 The communication terminal determines whether the two are consistent, if yes, transpose step 1112; otherwise, proceeds to step 1113;
  • Step 1112 Maintain a connection with the WIFI hotspot
  • Step 1113 Delete the currently connected WIFI hotspot
  • Step 1114 Determine whether the user-specified WIFI hotspot remains in the unencrypted WIFI hotspot list, and if yes, transpose step 1102; otherwise, end the processing flow.
  • the process of verifying the received verification information by the network server in the above step 1106 is similar to the processing procedure shown in FIG. 9, except that the network server encrypts the verification information, and specifically encrypts the 128-bit AES algorithm.
  • the communication terminal automatically filters the WIFI hotspots that need to be verified twice in the unencrypted WIFI hotspot by using the preset verification information, and does not require the user to manually perform verification and selection, thereby simplifying the WIFI.
  • the operation process of communication improves the satisfaction of the user experience to a large extent.
  • the communication terminal is prevented from erroneously accessing the unencrypted WIFI hotspot provided by the operator and requiring secondary verification, thereby reducing the user's economic expenditure and further improving the user experience satisfaction.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may employ hardware embodiments, software embodiments, or junctions. In the form of an embodiment of the software and hardware aspects. Moreover, the invention can be embodied in the form of one or more computer program products embodied on a computer usable storage medium (including but not limited to disk storage and optical storage, etc.) in which computer usable program code is embodied.
  • a computer usable storage medium including but not limited to disk storage and optical storage, etc.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本发明公开了一种WIFI热点连接及选择方法、通信终端及系统,通信终端选择并连接一个无加密的WIFI热点;向网络服务器发送预置的验证信息;网络服务器接收到验证信息后,与本地预置的验证信息进行比较,在二者一致时向通信终端反馈验证信息;通信终端接收网络服务器反馈的验证信息并与本地预置的验证信息比较,在二者一时,保持与该WIFI热点的连接。

Description

WIFI热点连接及选择方法、 通信终端及系统 技术领域
本发明涉及通信领域, 具体涉及一种 WIFI热点连接及选择方法、 通信 终端及系统。 背景技术
随着 Internet的高速发展和通信技术的日新月异, 运营商和各个商家, 在各种不同的场所(如机场)和地点 (如咖啡店), 都已经开始逐步提供无 加密的 WIFI热点, 以用来吸引用户和给用户提供方便的网络访问。
但是, 运营商和商家所提供的无加密的 WIFI设备, 却由于性质不同而 在用户体验上有着根本的差异:运营商所提供的无加密 WIFI热点其实是运 营商提供有偿网络服务的一种, 在连接后, 需要在运营商的页面进行二次 认证后, 才能真正的接入 Internet 商家提供的 WIFI热点则是不需要进行 二次认证, 连接以后就可以直接访问 Internet 且由于运营商的实力远胜于 商家, 所以很多情况下, 运营商的无加密 WIFI热点的信号质量要比商家所 提供的无加密 WIFI 热点要强。 这样, 用户在选择无加密 WIFI 热点接入 Internet时, 即使 WIFI的管理软件支持自动加入无加密 WIFI热点, 仍然需 要手动验证该 WIFI热点是否需要二次认证和选择, 过程繁瑣, 在较大程度 上降低了用户体验的满意度。 发明内容
为解决现有存在的技术问题,本发明实施例提供一种 WIFI热点连接及 选择方法、 通信终端及系统。
为了解决上述问题, 本发明实施例提供了一种 WIFI热点连接方法, 包 括:
通信终端连接一个无加密的 WIFI热点;
所述通信终端向网络服务器发送预置的验证信息;
所述通信终端接收所述网络服务器反馈的验证信息, 并与本地预置的 所述验证信息比较, 在二者一致时保持与所述 WIFI热点的连接。
在本发明的一种实施例中, 当所述通信终端确定所述网络服务器反馈 的验证信息与本地的所述验证信息不一致时, 所述方法还包括:
所述通信终端重新选择并连接至一个无加密的 WIFI热点; 或者, 所述通信终端将所述 WIFI热点从无加密 WIFI热点列表中删除后, 重 新选择并连接至一个无加密的 WIFI热点; 或者,
所述通信终端直接退出 WIFI连接。
在本发明的一种实施例中,所述通信终端连接一个无加密的 WIFI热点 之前, 所述方法还包括:
根据预置的运营商 WIFI 热点信息将所述通信终端搜索到的无加密 WIFI热点中的运营商 WIFI热点剔除。
在本发明的一种实施例中, 所述通信终端向网络服务器发送预置的验 证信息之前, 所述方法还包括:
所述通信终端对待发送的验证信息进行加密; 和 /或,
所述通信终端将接收到的验证信息与本地预置的所述验证信息比较之 前, 所述方法还包括:
对接收到的验证信息进行解密。
为了解决上述问题, 本发明实施例还提供了一种 WIFI热点选择方法, 包括:
通信终端连接一个无加密的 WIFI热点;
所述通信终端向网络服务器发送预置的验证信息, 所述网络服务器预 置有验证信息;
所述网络服务器接收所述通信终端发送的验证信息, 并与本地预置的 验证信息进行比较, 在二者一致时向所述通信终端反馈验证信息;
所述通信终端接收所述网络服务器反馈的验证信息, 并与本地预置的 所述验证信息比较, 在二者一致时保持与所述 WIFI热点的连接。
在本发明的一种实施例中, 当所述网络服务器确定所述通信终端发送 的验证信息与本地预置的验证信息不一致时, 或者当所述通信终端确定所 述网络服务器反馈的验证信息与本地预置的验证信息不一致时, 所述方法 还包括:
所述通信终端重新选择并连接至一个无加密的 WIFI热点; 或者, 所述通信终端将所述 WIFI热点从无加密 WIFI热点列表中删除后, 重 新选择并连接至一个无加密的 WIFI热点; 或者,
所述通信终端直接退出 WIFI连接。
在本发明的一种实施例中, 所述通信终端向网络服务器发送预置的验 证信息之前, 所述方法还包括:
所述通信终端对待发送的验证信息进行加密;
相应地, 所述网络服务器将接收到的验证信息与本地预置的所述验证 信息比较之前, 所述方法还包括: 对接收到的验证信息进行解密。
在本发明的一种实施例中, 所述网络服务器反馈验证信息之前, 所述 方法还包括:
所述网络服务器将待发送的验证信息进行加密;
相应地, 所述通信终端将接收到的验证信息与本地预置的验证信息比 较之前, 所述方法还包括: 对接收到的验证信息进行解密。
在本发明的一种实施例中, 所述通信终端将待发送的验证信息加密成 二进制验证数据信息。 在本发明的一种实施例中, 所述网络服务器将待发送的验证信息加密 成二进制验证数据信息。
为了解决上述问题, 本发明实施例还提供了一种通信终端, 包括 WIFI 通信模块、 第一发送模块、 第一接收模块和第一处理模块; 其中,
所述 WIFI通信模块配置为连接一个无加密的 WIFI热点;
所述第一发送模块配置为向网络服务器发送所述通信终端本地预置的 验证信息;
所述第一接收模块配置为接收所述网络服务器反馈的验证信息; 所述第一处理模块配置为将所述第一接收模块接收到的验证信息与所 述通信终端本地预置的所述验证信息进行比较, 且在二者一致时保持所述 WIFI通信模块与所述 WIFI热点的连接。
在本发明的一种实施例中, 所述通信终端还包括重选模块, 所述重选 模块配置为在所述第一处理模块确定所述第一接收模块接收到的验证信息 与所述通信终端本地预置的验证信息不一致时, 重新选择一个无加密的 WIFI热点与所述 WIFI通信模块连接; 或将所述 WIFI热点从无加密 WIFI 热点列表中删除后, 重新选择一个无加密的 WIFI热点与所述 WIFI通信模 块连接。
在本发明的一种实施例中, 所述通信终端还包括 选模块, 配置为在 所述 WIFI通信模块选择并连接一个无加密 WIFI热点之前, 根据预置的运 营商 WIFI热点信息将所述 WIFI通信模块搜索到的无加密 WIFI热点中的 运营商 WIFI热点剔除。
在本发明的一种实施例中, 所述通信终端还包括第一加密模块和第一 解密模块, 所述第一加密模块配置为在所述第一发送模块将所述验证信息 发送给所述网络服务器之前, 对待发送的验证信息进行加密; 和 /或,
所述第一解密模块配置为在所述第一处理模块将所述第一接收模块接 收到的验证信息与所述通信终端本地预置的所述验证信息进行比较之前, 对所述第一接收模块接收到的验证信息进行解密处理。
为了解决上述问题, 本发明实施例还提供了一种通信系统, 包括通信 终端和网络服务器;
所述通信终端包括 WIFI通信模块、 第一发送模块、 第一接收模块和第 一处理模块; 所述网络服务器包括第二接收模块、 第二发送模块、 和第二 处理模块; 其中,
所述 WIFI通信模块配置为选择并连接一个无加密的 WIFI热点; 所述第一发送模块配置为向所述第二接收模块发送所述通信终端本地 预置的验证信息;
所述第二接收模块配置为接收所述第一发送模块发送的验证信息; 所述第二处理模块配置为将所述第二接收模块接收到的验证信息与所述网 络服务器本地预置的验证信息进行比较, 并在二者一致时通过所述第二发 送模块向所述第一接收模块发送验证信息;
所述第一接收模块配置为接收所述第二发送模块发送的验证信息; 所述第一处理模块配置为将所述第一接收模块接收到的验证信息与所 述通信终端本地预置的所述验证信息进行比较, 且在二者一致时保持所述 WIFI通信模块与所述 WIFI热点的连接。
在本发明的一种实施例中, 所述通信终端还包括: 第一加密模块和第 一解密模块, 所述网络服务器还包括第二解密模块和第二加密模块; 其中, 所述第一加密模块配置为在所述第一发送模块将所述验证信息发送给 所述网络服务器之前, 对待发送的验证信息进行加密;
所述第一解密模块配置为在所述第一处理模块将所述第一接收模块接 收到的验证信息与所述通信终端本地预置的所述验证信息进行比较之前, 对所述第一接收模块接收到的验证信息进行解密处理; 所述第二解密模块配置为在所述第二处理模块将所述第二接收模块接 收到的验证信息与所述网络服务器本地预置的验证信息进行比较前, 对所 述第二接收模块接收到的验证信息进行解密处理;
所述第二加密模块配置为在所述第二发送模块向所述通信终端发送所 述验证信息之前, 将待发送的所述验证信息进行加密处理。
为了解决上述问题, 本发明实施例还提供了计算机存储介质, 所述计 算机存储介质包括一组指令, 当执行所述指令时, 引起至少一个处理器执 行上述的 WIFI热点选择方法。
本发明实施例的有益效果是:
本发明实施例提供的 WIFI热点连接及选择方法、 通信终端及系统, 通 信终端选择并连接一个无加密的 WIFI热点; 向网络服务器发送预置的验证 信息, 网络服务器也预置有验证信息; 网络服务器接收到验证信息后, 与 本地预置的验证信息进行比较, 在二者一致时向通信终端反馈验证信息; 通信终端接收网络服务器反馈的验证信息并与本地预置的验证信息比较, 在二者一时, 表明当前连接的 WIFI热点是不需要进行二次认证的热点, 保 持与该 WIFI热点的连接。 可见, 本发明实施例中的通信终端通过预置的验 证信息实现了自动对无加密 WIFI热点中需要二次验证的 WIFI热点的筛选, 不需要用户手动去进行验证和选择, 简化了 WIFI通信的操作过程, 在较大 程度上提高了用户体验的满意度。 附图说明
在附图 (其不一定是按比例绘制的) 中, 相似的附图标记可在不同的 视图中描述相似的部件。 具有不同字母后缀的相似附图标记可表示相似部 件的不同示例。 附图以示例而非限制的方式大体示出了本文中所讨论的各 个实施例。
图 1为本发明实施例一提供的 WIFI热点选择方法流程示意图; 图 2为本发明实施例二提供的通信系统结构示意图;
图 3为本发明实施例二提供的通信终端结构示意图一;
图 4为本发明实施例二提供的网络服务器结构示意图一;
图 5为本发明实施例二提供的通信终端结构示意图二;
图 6为本发明实施例二提供的通信终端结构示意图三;
图 7为本发明实施例二提供的网络服务器结构示意图二;
图 8为本发明实施例三提供的应用场景一中 WIFI热点选择方法流程示 意图;
图 9为本发明实施例图 8中网络服务器对验证信息进行处理的流程示 意图;
图 10为本发明实施例三提供的应用场景二中 WIFI热点选择方法流程 示意图;
图 11为本发明实施例三提供的应用场景三中 WIFI热点选择方法流程 示意图。 具体实施方式
下面通过具体实施方式结合附图对本发明作进一步详细说明。
实施例一:
请参见图 1所示: 本实施例提供的 WIFI热点选择方法包括以下步骤: 步骤 101: 通信终端选择并连接一个无加密的 WIFI热点;
步骤 102: 通信终端向网络服务器发送预置的验证信息, 该网络服务器 预置有该验证信息;
步骤 103: 网络服务器接收通信终端发送的验证信息, 并与本地预置的 验证信息进行比较, 在二者一致时向通信终端反馈验证信息;
步骤 104: 通信终端接收网络服务器反馈的验证信息, 并与本地预置的 所述验证信息比较, 在二者一致时表明通信终端当前连接的 WIFI热点不需 要二次睑证, 保持通信终端与该 WIFI热点连接。
可见, 本实施例中的通信终端通过预置的验证信息实现了自动对无加 密 WIFI热点中需要二次验证的 WIFI热点的筛选, 不需要用户手动去进行验 证和选择, 简化了 WIFI通信的操作过程, 在较大程度上提高了用户体验的 满意度。 也在较大程度上避免通信终端误接入运营商提供的需要二次验证 的无加密 WIFI热点, 减少用户经济支出, 进一步提高用户体验的满意度。
在上述步骤 101中的通信终端可以是手机、 IPAD等具有 WIFI通信功 能的终端设备; 其选择 WIFI热点的方式可以是以下方式中的任意一种: 方式一: 通信终端搜索无加密 WIFI热点得到无加密 WIFI热点列表, 然后从该 WIFI热点列表中选择一个进行连接; 选择时, 可以选择信号质量 最好的一个 WIFI 热点, 也可以根据用户指定的顺序选择, 甚至可以从该 WIFI热点列表中随机选择一个 WIFI热点等等;
方式二: 直接根据用户键入的 WIFI热点信息搜索对应的 WIFI热点, 并进行连接。
在步骤 103 中, 当网络服务器确定通信终端发送的验证信息与本地预 置的验证信息不一致时; 网络服务器可以通知通信终端重新选择一个无加 密 WIFI热点并连接, 然后转至步骤 102; 直至选择到一个不需要二次验证 的无加密 WIFI热点, 或当前没有剩余的无加密 WIFI热点。
在步骤 104 中, 当通信终端确定网络服务器反馈的验证信息与本地的 验证信息不一致时, 重新选择并连接至一个无加密的 WIFI热点。 然后转至 步骤 102, 直至选择到一个不需要二次验证的无加密 WIFI热点, 或当前没 有剩余的无加密 WIFI热点。
当然, 在上述步骤 103和步骤 104中, 当比较验证信息不一致时, 通 信终端可以先将当前验证的 WIFI热点从无加密 WIFI热点列表中删除后, 在从该列表中重新选择并连接至一个无加密的 WIFI热点;在某些应用场景 下, 通信终端可直接退出 WIFI连接, 例如在当前的无加密 WIFI热点本来 就只有一个的情况下等等。
在本实施例中, 在上述步骤 101之前, 还可包括对运营商 WIFI热点进行 剔除的步骤,以提高后续验证的成功率。具体地,可根据预置的运营商 WIFI 热点信息将通信终端搜索到的无加密 WIFI热点中的运营商 WIFI热点剔除。 更具体地, 可以先将各运营商提供的 WIFI热点信息 (例如名称等)进行预 置, 具体可预置在通信终端本地, 也可以预置在通信终端可以通信获取信 息的其他装置上, 然后通信终端在完成无加密 WIFI热点搜索得到无加密 WIFI热点列表后, 根据预置的运营商 WIFI热点信息从列表中将运营商 WIFI 热点剔除。
在本实施例中, 为了保证验证信息在传递过程中不会被需要二次验证 的 WIFI热点所墓改, 还可将验证信息发送给对方之前, 对待发送的验证信 息进行加密。 具体地, 在上述步骤 102中, 通信终端在向网络服务器发送验 证信息之前, 对将要发送的验证信息进行加密; 和 /或在上述步骤 103中, 网 络服务器在向通信终端发送验证信息之前, 对待发送的验证信息进行加密。 对应地, 通信终端和 /或网络服务器将收到的验证信息与本地预置的验证信 息比较之前, 还包括对接收到的验证信息进行解密的过程。 本实施例中, 具体的加解密算法可根据具体的应用场景选择, 在此不再赘述。 在本实施 例中, 为了进一步保证加密的安全和可靠性, 通信终端和 /或网络服务器将 待发送的验证信息加密成二进制验证数据信息。
值得注意的是, 本实施例中验证信息理论上可以是任何起到区分和辨 识作用的数据信息; 为了保证该信息的安全性和可靠性, 可根据具体的应 用场景设置其具体的格式和内容。 实施例二:
本实施例提供了一种通信系统, 请参见图 2所示, 其包括通信终端 21和 网络服务器 22; 其中, 请分别参见图 3和图 4所示, 通信终端包括 WIFI通信 模块 211、 第一发送模块 212、 第一接收模块 213和第一处理模块 214; 网络 服务器包括第二接收模块 221、 第二发送模块 222、 和第二处理模块 223;
通信终端的 WIFI通信模块 211配置为选择并连接一个无加密的 WIFI 热点; 其选择 WIFI热点的方式可以是以下方式中的任意一种:
方式一: 通信终端搜索无加密 WIFI热点得到无加密 WIFI热点列表, 然后从该 WIFI热点列表中选择一个进行连接; 选择时, 可以选择信号质量 最好的一个 WIFI 热点, 也可以根据用户指定的顺序选择, 甚至可以从该 WIFI热点列表中随机选择一个 WIFI热点等等;
方式二: 直接根据用户键入的 WIFI热点信息搜索对应的 WIFI热点, 并进行连接。
通信终端的第一发送模块 212配置为在 WIFI热点连接至一个无加密的 WIFI热点后, 向网络服务器发送通信终端本地预置的验证信息;
网络服务器的第二接收模块 221配置为接收第一发送模块 212发送的验 证信息;
网络服务器的第二处理模块 223配置为将第二接收模块 221收到的验证 信息与网络服务器本地预置的验证信息进行比较, 并在二者一致时通过第 二发送 223模块向通信终端发送验证信息;
通信终端的第一接收模块 213配置为接收第二发送模块 223发送的验证 信息;
通信终端的第一处理模块 214配置为将第一接收模块 213接收到的验证 信息与本地预置的所述验证信息进行比较, 且在二者一致时, 表明 WIFI热 点当前连接的无加密 WIFI热点不需要二次验证,保持 WIFI通信模块 211与该 述 WIFI热点的连接。
在本实施例中, 通信终端还可包括重选模块, 该重选模块配置为在通 信终端的第一处理模块 214确定第一接收模块 213接收到的验证信息与通信 终端本地预置的验证信息不一致时, 重新选择一个无加密的 WIFI热点与所 述^1?1通信模块211连接; 或将当前连接的 WIFI热点从无加密 WIFI热点列 表中删除后, 重新选择一个无加密的 WIFI热点与所述 WIFI通信模块 211连 接。 以及配置为在网络服务器的第二处理模块 223确定第二接收模块 221接 收到的验证信息与网络服务器本地存储的验证信息不一致时, 重新选择一 个无加密的 WIFI热点与所述 WIFI通信模块 211连接; 或将当前连接的 WIFI 热点从无加密 WIFI热点列表中删除后, 重新选择一个无加密的 WIFI热点与 所述 WIFI通信模块 211连接。
请参见图 5所示, 本实施例中的通信终端还包括筛选模块 215, 该筛选 模块 215配置为在 WIFI通信模块选择并连接一个无加密的 WIFI热点前,对运 营商 WIFI热点进行剔除, 以提高后续验证的成功率。 具体地, 筛选模块 215 可根据预置的运营商 WIFI热点信息将通信终端搜索到的无加密 WIFI热点中 的运营商 WIFI热点剔除。 更具体地, 可以先将各运营商提供的 WIFI热点信 息 (例如名称等)进行预置, 具体可预置在通信终端本地, 也可以预置在 通信终端可以通信获取信息的其他装置上, 然后通信终端在完成无加密 WIFI热点搜索得到无加密 WIFI热点列表后, 根据预置的运营商 WIFI热点信 息从列表中将运营商 WIFI热点剔除。
为了保证验证信息在发送过程中的安全性, 请参见图 6所示, 本实施例 中的通信终端还可包括第一加密模块 216和第一解密模块 217, 第一加密模 块 216配置为在通信终端的第一发送模块 212将验证信息发送给网络服务器 之前, 对该待发送的验证信息进行加密; 第一解密模块 217配置为在第一处 理模块 214将通信终端的第一接收模块 211接收到的验证信息与通信终端本 地预置的验证信息进行比较之前, 对第一接收模块 211接收到的验证信息进 行解密处理。 对应地, 请参见图 7所示, 本实施例中的网络服务器还包括第二解密模 块 224和第二加密模块 225; 第二解密模块 224配置为在网络服务器的第二处 理模块 223将第二接收模块 221接收到的验证信息与网络服务器本地预置的 验证信息进行比较前, 对第二接收模块 221接收到的验证信息进行解密处 理; 第二加密模块 225配置为在网络服务器的第二发送模块 222向所述通信 终端发送验证信息之前, 将待发送的所述验证信息进行加密处理。
本实施例中的第一加密模块 216和第二加密模块 224具体可将待发送的 验证信息加密成二进制验证数据信息, 以进一步确保其在传输过程的安全 性。 具体的加密算法可根据具体的应用场景选定。
实际应用时, WIFI通信模块 211可由通信终端中的中央处理器 (CPU, Central Processing Unit )、 数字信号处理器(DSP, Digital Signal Processor ) 或可编程逻辑阵列 (FPGA, Field - Programmable Gate Array )结合电路实 现, 第一发送模块 212可由通信终端中的发射机实现, 第一接收模块 213第 一加密模块 216及第一解密模块 217可由通信终端中的接收机实现, 第一处 理模块 214、 重选模块、 筛选模块 215可由通信终端中的 CPU、 DSP或 FPGA 实现, 重选模块可由通信终端中的 CPU、 DSP或 FPGA实现; 第二接收模块 221可由网络服务器中的接收机实现, 第二发送模块 222可由网络服务器中 的发射机实现, 第二处理模块 223、 第二解密模块 224及第二加密模块 225可 由网络服务器中的 CPU、 DSP或 FPGA实现。
实施例三:
下面结合几种具体的应用场景对本发明做进一步的说明, 以帮助更好 的理解本发明的方案。
应用场景一:
仅针对单个无加密 WIFI热点进行验证的过程, 该单个无加密 WIFI热点 可以是用户指定的, 也可能是当前仅搜索到一个无加密 WIFI热点等等。 请 参见图 8所示, 其包括以下步骤:
步骤 801 : 通信终端连接至该无加密 WIFI热点;
步骤 802: 通信终端对待发送的验证信息进行数据加密, 将验证信息加 密成二进制验证数据信息; 本步骤中具体可釆用 1024位的 RSA口密;
步骤 803: 通信终端将加密后的验证信息发送给对应的网络服务器; 步骤 804: 网络服务器对接收到的验证信息进行验证处理, 并在验证与 其本地预置的验证信息一致时, 向通信终端反馈加密后的验证信息;
步骤 805: 通信终端接收网络服务器发送的验证信息;
步骤 806: 通信终端对接收到的验证信息进行解密;
步骤 807: 通信终端将解密后的验证信息与本地预置的验证信息进行比 较;
步骤 808: 通信终端判断二者是否一致, 如是, 转置步骤 809; 否则, 结束该流程。
步骤 809: 保持与该 WIFI热点的连接。
上述步骤 804中, 网络服务器对接收到的验证信息进行验证处理的过程 请参见图 9所示, 包括:
步骤 8041: 接收通信终端发送的二进制验证数据信息;
步骤 8042: 判断是否接收成功, 如是, 转至步骤 8043, 否则, 结束该 处理流程;
步骤 8043: 解密接收到的二进制验证数据信息;
步骤 8044: 将解密后的验证信息与本地预置的验证信息进行比较; 步骤 8045: 判断二者是否一致, 如是, 转至步骤 8046, 否则, 结束该 处理流程;
步骤 8046: 加密本地预置的验证信息, 具体可釆用釆用 1024位的 RSA 加密算法将其加密成二进制验证数据信息; 步骤 8047: 将加密后的验证信息发送给通信终端。
应用场景二:
上述应用场景一仅以单个 WIFI热点为例进行的说明。 但是, 在很多应 用场景下, 通信终端搜索到的无加密 WIFI热点往往是多个。 下面结合对通 信终端搜索到的多个无加密 WIFI热点进行验证的过程进行说明。 请参见图 10所示, 其包括:
步骤 1001 : 通信终端搜索并保存无加密 WIFI热点, 得到无加密 WIFI热 点列表;
步骤 1002: 通信终端从无加密 WIFI热点列表中选择一个无加密 WIFI热 点进行连接, 具体可选择信号最好的 WIFI热点进行连接; 当然, 也可根据 用户设定的其它规则选择;
步骤 1003: 通信终端对待发送的验证信息进行数据加密, 将待发送的 验证信息加密成二进制验证数据信息;
步骤 1004: 通信终端将加密后的验证信息发送给对应的网络服务器; 步骤 1005: 通信终端判断该验证信息是否发送成功, 如是, 转至步骤
1006, 否则, 转置步骤 1013;
步骤 1006: 网络服务器对接收到的验证信息进行验证处理, 并在验证 与其本地预置的验证信息一致时, 向通信终端反馈加密后的验证信息; 步骤 1007: 通信终端接收网络服务器发送的验证信息;
步骤 1008: 通信终端判断该验证信息是否接收成功, 如是, 转至步骤
1009, 否则, 转置步骤 1013;
步骤 1009: 通信终端对接收到的验证信息进行解密;
步骤 1010: 通信终端将解密后的验证信息与本地预置的验证信息进行 比较;
步骤 1011 : 通信终端判断二者是否一致, 如是, 转置步骤 1012; 否则, 转至步骤 1013;
步骤 1012: 保持与该 WIFI热点的连接;
步骤 1013: 删除当前连接的 WIFI热点;
步骤 1014: 判断无加密 WIFI热点列表中是否还剩余 WIFI热点, 如是, 转置步骤 1002; 否则, 结束该处理流程。
上述步骤 1006中网络服务器对接收到的验证信息进行验证处理的过程 与图 9所示的处理过程类似, 在此不再赘述。
应用场景三:
在很多应用场景下, 通信终端搜索到的无加密 WIFI热点往往是多个; 这多个无加密 WIFI热点中, 即可能包括运营商提供的需二次验证的 WIFI热 点, 也包括其他商家等提供的不需要二次验证的 WIFI热点。 因此, 可以先 将搜索到的无加密 WIFI热点中商家提供的 WIFI热点剔除, 再进行后续的连 接及验证过程, 能提高验证的成功率。 且通信终端在选择连接 WIFI热点时, 可以针对用户指定的 WIFI热点进行连接。 下面的流程以该例进行说明, 请 参见图 11所示, 其包括:
步骤 1101 : 通信终端搜索并只保存非运营商名称的无加密 WIFI热点, 得到无加密 WIFI热点列表;
步骤 1102:通信终端从连接至用户指定顺序的第一个无加密 WIFI热点; 当然, 也可根据用户设定的其它规则选择;
步骤 1103: 通信终端对待发送的验证信息进行数据加密, 将待发送的 验证信息加密成二进制验证数据信息; 本步骤中具体可釆用 128位的 AES算 法, 当然可以釆用其它的加密算法;
步骤 1104: 通信终端将加密后的验证信息发送给对应的网络服务器; 步骤 1105: 通信终端判断该验证信息是否发送成功, 如是, 转至步骤 1106, 否则, 转置步骤 1113; 步骤 1106: 网络服务器对接收到的验证信息进行验证处理, 并在验证 与其本地预置的验证信息一致时, 向通信终端反馈加密后的验证信息; 步骤 1107: 通信终端接收网络服务器发送的验证信息;
步骤 1108: 通信终端判断该验证信息是否接收成功, 如是, 转至步骤 1109, 否则, 转置步骤 1113;
步骤 1109: 通信终端对接收到的验证信息进行解密;
步骤 1110: 通信终端将解密后的验证信息与本地预置的验证信息进行 比较;
步骤 1111 : 通信终端判断二者是否一致, 如是, 转置步骤 1112; 否则, 转至步骤 1113;
步骤 1112: 保持与该 WIFI热点的连接;
步骤 1113: 删除当前连接的 WIFI热点;
步骤 1114: 判断无加密 WIFI热点列表中是否还剩余用户指定的 WIFI热 点, 如是, 转置步骤 1102; 否则, 结束该处理流程。
上述步骤 1106中网络服务器对接收到的验证信息进行验证处理的过程 与图 9所示的处理过程类似, 只是网络服务器在对验证信息进行加密时, 具 体可釆用 128位的 AES算法进行加密。
可见, 本发明实施例提供的方案, 通信终端通过预置的验证信息实现 了自动对无加密 WIFI热点中需要二次验证的 WIFI热点的筛选, 不需要用户 手动去进行验证和选择, 简化了 WIFI通信的操作过程, 在较大程度上提高 了用户体验的满意度。 也在较大程度上避免通信终端误接入运营商提供的 需要二次验证的无加密 WIFI热点, 减少用户经济支出, 进一步提高用户体 验的满意度。
本领域内的技术人员应明白, 本发明的实施例可提供为方法、 系统、 或计算机程序产品。 因此, 本发明可釆用硬件实施例、 软件实施例、 或结 合软件和硬件方面的实施例的形式。 而且, 本发明可釆用在一个或多个其 中包含有计算机可用程序代码的计算机可用存储介质 (包括但不限于磁盘 存储器和光学存储器等 )上实施的计算机程序产品的形式。
本发明是参照根据本发明实施例的方法、 设备(系统)、 和计算机程序 产品的流程图和 /或方框图来描述的。 应理解可由计算机程序指令实现流程 图和 /或方框图中的每一流程和 /或方框、以及流程图和 /或方框图中的流程和 /或方框的结合。 可提供这些计算机程序指令到通用计算机、 专用计算机、 嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器, 使得 在流程图一个流程或多个流程和 /或方框图一个方框或多个方框中指定的功 能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理 设备以特定方式工作的计算机可读存储器中, 使得存储在该计算机可读存 储器中的指令产生包括指令装置的制造品, 该指令装置实现在流程图一个 流程或多个流程和 /或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备 上, 使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机 实现的处理, 从而在计算机或其他可编程设备上执行的指令提供用于实现 在流程图一个流程或多个流程和 /或方框图一个方框或多个方框中指定的功 能的步骤。 以上内容是结合具体的实施方式对本发明所作的进一步详细说明, 不 能认定本发明的具体实施只局限于这些说明。 对于本发明所属技术领域的 普通技术人员来说, 在不脱离本发明构思的前提下, 还可以做出若干简单 推演或替换, 都应当视为属于本发明的保护范围。

Claims

权利要求书
1、 一种 WIFI热点连接方法, 包括:
通信终端连接一个无加密的 WIFI热点;
所述通信终端向网络服务器发送预置的验证信息;
所述通信终端接收所述网络服务器反馈的验证信息, 并与本地预置的 所述验证信息比较, 在二者一致时保持与所述 WIFI热点的连接。
2、 如权利要求 1所述的 WIFI热点连接方法, 其中, 当所述通信终端确 定所述网络服务器反馈的验证信息与本地预置的所述验证信息不一致时, 所述方法还包括:
所述通信终端重新选择并连接至一个无加密的 WIFI热点; 或者, 所述通信终端将所述 WIFI热点从无加密 WIFI热点列表中删除后, 重新 选择并连接至一个无加密的 WIFI热点; 或者,
所述通信终端直接退出 WIFI连接。
3、 如权利要求 1或 2所述的 WIFI热点连接方法, 其中, 所述通信终端连 接一个无加密的 WIFI热点之前, 所述方法还包括:
根据预置的运营商 WIFI热点信息将所述通信终端搜索到的无加密 WIFI 热点中的运营商 WIFI热点剔除。
4、 如权利要求 1或 2所述的 WIFI热点连接方法, 其中, 所述通信终端向 网络服务器发送预置的验证信息之前, 所述方法还包括:
所述通信终端对待发送的验证信息进行加密; 和 /或,
所述通信终端将接收到的验证信息与本地预置的所述验证信息比较之 前, 所述方法还包括:
对接收到的验证信息进行解密。
5、 一种 WIFI热点选择方法, 包括:
通信终端连接一个无加密的 WIFI热点; 所述通信终端向网络服务器发送预置的验证信息, 所述网络服务器预 置有验证信息;
所述网络服务器接收所述通信终端发送的验证信息, 并与本地预置的 验证信息进行比较, 在二者一致时向所述通信终端反馈验证信息;
所述通信终端接收所述网络服务器反馈的验证信息, 并与本地预置的 验证信息比较, 在二者一致时保持与所述 WIFI热点的连接。
6、 如权利要求 5所述的 WIFI热点选择方法, 其中, 当所述网络服务器 确定所述通信终端发送的验证信息与本地预置的验证信息不一致时, 或者 当所述通信终端确定所述网络服务器反馈的验证信息与本地预置的验证信 息不一致时, 所述方法还包括:
所述通信终端重新选择并连接至一个无加密的 WIFI热点; 或者, 所述通信终端将所述 WIFI热点从无加密 WIFI热点列表中删除后, 重新 选择并连接至一个无加密的 WIFI热点; 或者,
所述通信终端直接退出 WIFI连接。
7、 如权利要求 5或 6所述的 WIFI热点选择方法, 其中, 所述通信终端向 网络服务器发送预置的验证信息之前, 所述方法还包括:
所述通信终端对待发送的验证信息进行加密;
相应地, 所述网络服务器将接收到的验证信息与本地预置的所述验证 信息比较之前, 所述方法还包括: 对接收到的验证信息进行解密。
8、 如权利要求 5或 6所述的 WIFI热点选择方法, 其中, 所述网络服务器 反馈验证信息之前, 所述方法还包括:
所述网络服务器将待发送的验证信息进行加密;
相应地, 所述通信终端将接收到的验证信息与本地预置的验证信息比 较之前, 所述方法还包括: 对接收到的验证信息进行解密。
9、 如权利要求 7所述的 WIFI热点选择方法, 其中, 所述通信终端将待 发送的验证信息加密成二进制验证数据信息。
10、 如权利要求 8所述的 WIFI热点选择方法, 其中, 所述网络服务器将 待发送的验证信息加密成二进制验证数据信息。
11、 一种通信终端, 包括 WIFI通信模块、 第一发送模块、 第一接收模 块和第一处理模块; 其中,
所述 WIFI通信模块配置为连接一个无加密的 WIFI热点;
所述第一发送模块配置为向网络服务器发送所述通信终端本地预置的 验证信息;
所述第一接收模块配置为接收所述网络服务器反馈的验证信息; 所述第一处理模块配置为将所述第一接收模块接收到的验证信息与所 述通信终端本地预置的所述验证信息进行比较, 且在二者一致时保持所述
WIFI通信模块与所述 WIFI热点的连接。
12、 如权利要求 11所述的通信终端, 其中, 所述通信终端还包括重选 模块, 所述重选模块配置为在所述第一处理模块确定所述第一接收模块接 收到的验证信息与所述通信终端本地预置的验证信息不一致时, 重新选择 一个无加密的 WIFI热点与所述 WIFI通信模块连接; 或将所述 WIFI热点从无 加密 WIFI热点列表中删除后, 重新选择一个无加密的 WIFI热点与所述 WIFI 通信模块连接。
13、 如权利要求 11或 12所述的通信终端, 其中, 所述通信终端还包括 筛选模块, 配置为在所述 WIFI通信模块选择并连接一个无加密 WIFI热点之 前, 根据预置的运营商 WIFI热点信息将所述 WIFI通信模块搜索到的无加密 WIFI热点中的运营商 WIFI热点剔除。
14、 如权利要求 11或 12所述的通信终端, 其中, 所述通信终端还包括 第一加密模块和第一解密模块, 所述第一加密模块配置为在所述第一发送 模块将所述验证信息发送给所述网络服务器之前, 对待发送的验证信息进 行力口密; 和 /或,
所述第一解密模块配置为在所述第一处理模块将所述第一接收模块接 收到的验证信息与所述通信终端本地预置的所述验证信息进行比较之前, 对所述第一接收模块接收到的验证信息进行解密处理。
15、 一种通信系统, 包括通信终端和网络服务器;
所述通信终端包括 WIFI通信模块、 第一发送模块、 第一接收模块和第 一处理模块; 所述网络服务器包括第二接收模块、 第二发送模块、 和第二 处理模块;
所述 WIFI通信模块配置为选择并连接一个无加密的 WIFI热点; 所述第一发送模块配置为向所述第二接收模块发送所述通信终端本地 预置的验证信息;
所述第二接收模块配置为接收所述第一发送模块发送的验证信息; 所述第二处理模块配置为将所述第二接收模块接收到的验证信息与所 述网络服务器本地预置的验证信息进行比较, 并在二者一致时通过所述第 二发送模块向所述第一接收模块发送验证信息;
所述第一接收模块配置为接收所述第二发送模块发送的验证信息; 所述第一处理模块配置为将所述第一接收模块接收到的验证信息与所 述通信终端本地预置的所述验证信息进行比较, 且在二者一致时保持所述
WIFI通信模块与所述 WIFI热点的连接。
16、 如权利要求 15所述的通信系统, 其中, 所述通信终端还包括: 第 一加密模块和第一解密模块, 所述网络服务器还包括第二解密模块和第二 加密模块; 其中,
所述第一加密模块配置为在所述第一发送模块将所述验证信息发送给 所述网络服务器之前, 对待发送的验证信息进行加密;
所述第一解密模块配置为在所述第一处理模块将所述第一接收模块接 收到的验证信息与所述通信终端本地预置的所述验证信息进行比较之前, 对所述第一接收模块接收到的验证信息进行解密处理;
所述第二解密模块配置为在所述第二处理模块将所述第二接收模块接 收到的验证信息与所述网络服务器本地预置的验证信息进行比较之前, 对 所述第二接收模块接收到的验证信息进行解密处理;
所述第二加密模块配置为在所述第二发送模块向所述通信终端发送所 述验证信息之前, 将待发送的所述验证信息进行加密处理。
17、 一种计算机存储介质, 所述计算机存储介质包括一组指令, 当执 行所述指令时, 引起至少一个处理器执行如权利要求 1至 4任一项所述的 WIFI热点选择方法、或者执行如权利要求 5至 10任一项所述的 WIFI热点 选择方法。
PCT/CN2014/080565 2014-02-27 2014-06-24 Wifi热点连接及选择方法、通信终端及系统 WO2015127734A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP14883598.6A EP3113528B1 (en) 2014-02-27 2014-06-24 Wifi hotspot connection and selection method, communications terminal and system
US15/121,764 US20170094692A1 (en) 2014-02-27 2014-06-24 WIFI Hotspot Connection and Selection Method, Communications Terminal and System
AU2014384393A AU2014384393B2 (en) 2014-02-27 2014-06-24 WIFI hotspot connection and selection method, communications terminal and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410068004.3A CN104883682A (zh) 2014-02-27 2014-02-27 Wifi热点连接及选择方法、通信终端及系统
CN201410068004.3 2014-02-27

Publications (1)

Publication Number Publication Date
WO2015127734A1 true WO2015127734A1 (zh) 2015-09-03

Family

ID=53950982

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/080565 WO2015127734A1 (zh) 2014-02-27 2014-06-24 Wifi热点连接及选择方法、通信终端及系统

Country Status (5)

Country Link
US (1) US20170094692A1 (zh)
EP (1) EP3113528B1 (zh)
CN (1) CN104883682A (zh)
AU (1) AU2014384393B2 (zh)
WO (1) WO2015127734A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187458A (zh) * 2015-10-28 2015-12-23 青岛汇云无限物联网有限公司 一种基于硬件本地认证请求的WiFi芯片认证系统及认证方法
CN105898739A (zh) * 2016-05-19 2016-08-24 郑建钦 一种防止热点非法冒充的方法
CN107484171A (zh) * 2017-09-11 2017-12-15 宇龙计算机通信科技(深圳)有限公司 热点接入方法及系统
CN108810916B (zh) * 2018-04-17 2022-08-12 深圳平安通信科技有限公司 Wi-Fi热点推荐方法、装置及存储介质
CN112040564B (zh) * 2020-08-25 2023-02-28 北京大米科技有限公司 信息传输方法、可读存储介质和电子设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090191892A1 (en) * 2008-01-25 2009-07-30 Garmin Ltd. Integrating position-determining and wi-fi functions
CN101877832A (zh) * 2009-04-28 2010-11-03 财团法人资讯工业策进会 智能型热点连线系统及方法
CN103024929A (zh) * 2012-12-20 2013-04-03 惠州Tcl移动通信有限公司 一种基于移动终端连接无线网络的方法及移动终端
CN103517372A (zh) * 2012-06-21 2014-01-15 中国移动通信集团公司 一种无线局域网中选择接入点的方法、装置及系统
CN103533610A (zh) * 2012-07-05 2014-01-22 瀚宇彩晶股份有限公司 无线网络选择方法及其可携式电子装置
CN104105167A (zh) * 2013-04-15 2014-10-15 中兴通讯股份有限公司 终端Wi-Fi热点接入处理方法及装置

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3951990B2 (ja) * 2003-09-05 2007-08-01 ブラザー工業株式会社 無線ステーション,プログラムおよび動作制御方法
JP2005252461A (ja) * 2004-03-02 2005-09-15 Nec Corp コンテンツ配信システム
JP4157079B2 (ja) * 2004-08-04 2008-09-24 インターナショナル・ビジネス・マシーンズ・コーポレーション 情報処理システム、通信方法、プログラム、記録媒体、及びアクセス中継サービスシステム
JP5337879B2 (ja) * 2008-09-29 2013-11-06 株式会社東芝 複数のネットワークアクセスポイントの事前評価
US8340700B2 (en) * 2009-06-26 2012-12-25 Oracle International Corporation Enabling binary object attachment support for short messaging service
JP4977229B2 (ja) * 2010-03-30 2012-07-18 株式会社バッファロー 通信を中継するための装置、方法、およびプログラム
KR101587003B1 (ko) * 2010-09-07 2016-01-20 삼성전자주식회사 무선 통신 시스템에서 와이 파이 연결 확인을 위한 장치 및 방법
US8479263B1 (en) * 2011-03-07 2013-07-02 Symantec Corporation Method and system for detecting captive portals
US8724603B2 (en) * 2011-03-08 2014-05-13 Blackberry Limited Network access and a mobile station configured for the same
CN102497638B (zh) * 2011-12-21 2015-04-01 上海云联计算机系统有限公司 快速接入公共无线局域网的方法、系统及其移动终端
US20140328187A1 (en) * 2012-01-02 2014-11-06 Nokia Corporation Network Connectivity Management in Wireless Apparatus
KR101453973B1 (ko) * 2012-07-02 2014-10-22 삼성전자주식회사 와이 파이 접속을 위한 방법 및 그 전자 장치
US9049405B2 (en) * 2012-07-31 2015-06-02 Hewlett-Packard Development Company, L.P. Soft proofing system
CN103118327A (zh) * 2013-01-25 2013-05-22 无锡万事通科技有限公司 基于WiFi的信息传递系统及方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090191892A1 (en) * 2008-01-25 2009-07-30 Garmin Ltd. Integrating position-determining and wi-fi functions
CN101877832A (zh) * 2009-04-28 2010-11-03 财团法人资讯工业策进会 智能型热点连线系统及方法
CN103517372A (zh) * 2012-06-21 2014-01-15 中国移动通信集团公司 一种无线局域网中选择接入点的方法、装置及系统
CN103533610A (zh) * 2012-07-05 2014-01-22 瀚宇彩晶股份有限公司 无线网络选择方法及其可携式电子装置
CN103024929A (zh) * 2012-12-20 2013-04-03 惠州Tcl移动通信有限公司 一种基于移动终端连接无线网络的方法及移动终端
CN104105167A (zh) * 2013-04-15 2014-10-15 中兴通讯股份有限公司 终端Wi-Fi热点接入处理方法及装置

Also Published As

Publication number Publication date
EP3113528A4 (en) 2017-01-18
EP3113528A1 (en) 2017-01-04
CN104883682A (zh) 2015-09-02
US20170094692A1 (en) 2017-03-30
EP3113528B1 (en) 2019-01-02
AU2014384393A1 (en) 2016-10-13
AU2014384393B2 (en) 2017-12-14

Similar Documents

Publication Publication Date Title
JP5739072B2 (ja) 共有エフェメラル・キー・データのセットを用いるエクスチェンジを符号化するためのシステム及び方法
US10149158B2 (en) Access method, system, and device of terminal, and computer storage medium
US20150264724A1 (en) Method and system of establishing wireless communication connection
WO2016026317A1 (zh) 一种wifi密码共享方法、终端和计算机存储介质
CN104661219B (zh) 一种无线设备的通讯方法、无线设备和服务器
CN109040318B (zh) Cdn网络的https连接方法及cdn节点服务器
WO2015127734A1 (zh) Wifi热点连接及选择方法、通信终端及系统
US11108548B2 (en) Authentication method, server, terminal, and gateway
CN108134789A (zh) 通过云进行设备间数据同步的方法和云服务器
US10097524B2 (en) Network configuration method, and related apparatus and system
WO2015164999A1 (zh) 虚拟卡下载方法、终端及中间设备
US20150271163A1 (en) Secure data transmission using multi-channel communication
CN111726801B (zh) 一种网络安全控制方法
JP5239123B2 (ja) 無線lanシステム
US11652625B2 (en) Touchless key provisioning operation for communication devices
CN104935435A (zh) 登录方法、终端及应用服务器
US20190037614A1 (en) Method, apparatus, storage medium, and terminal for establishing a wi-fi connection
CN106685897B (zh) 一种安全输入方法、装置和系统
WO2015117437A1 (zh) 一种文件加密方法、解密方法及装置
CN112104460A (zh) 一种非对称动态令牌加、解密算法的方法
CN105517102A (zh) 一种无线网络设备连接热点的方法、装置及设备
WO2017004828A1 (zh) 密码算法升级的方法及设备
CN107508814A (zh) 数据加密方法、解密方法、装置及系统
CN103986640A (zh) 一种可保障用户通讯内容安全的即时通讯方法及其系统
CN104980266A (zh) 数据通信方法和系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14883598

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 15121764

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2014883598

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2014883598

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2014384393

Country of ref document: AU

Date of ref document: 20140624

Kind code of ref document: A