WO2015127734A1 - Wifi热点连接及选择方法、通信终端及系统 - Google Patents
Wifi热点连接及选择方法、通信终端及系统 Download PDFInfo
- Publication number
- WO2015127734A1 WO2015127734A1 PCT/CN2014/080565 CN2014080565W WO2015127734A1 WO 2015127734 A1 WO2015127734 A1 WO 2015127734A1 CN 2014080565 W CN2014080565 W CN 2014080565W WO 2015127734 A1 WO2015127734 A1 WO 2015127734A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- verification information
- communication terminal
- module
- wifi hotspot
- wifi
- Prior art date
Links
- 238000004891 communication Methods 0.000 title claims abstract description 230
- 238000010187 selection method Methods 0.000 title claims abstract description 21
- 238000012795 verification Methods 0.000 claims abstract description 259
- 238000000034 method Methods 0.000 claims abstract description 53
- 238000012545 processing Methods 0.000 claims description 46
- 238000012216 screening Methods 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 13
- 238000004590 computer program Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 4
- 238000011161 development Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/11—Allocation or use of connection identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/20—Selecting an access point
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- WIFI hotspot connection and selection method communication terminal and system
- the present invention relates to the field of communications, and in particular, to a WIFI hotspot connection and selection method, a communication terminal and a system. Background technique
- the unencrypted WIFI hotspot provided by the operator is actually a kind of paid network service provided by the operator. After the connection, you need to perform secondary authentication on the operator's page before you can actually access the WIFI hotspot provided by the Internet merchant. You do not need to perform secondary authentication. After connecting, you can directly access the Internet and because of the strength of the operator. Better than merchants, so in many cases, the signal quality of the operator's unencrypted WIFI hotspot is stronger than the unencrypted WIFI hotspot provided by the merchant.
- the embodiments of the present invention provide a WIFI hotspot connection and selection method, a communication terminal, and a system.
- an embodiment of the present invention provides a WIFI hotspot connection method, and a package Includes:
- the communication terminal is connected to an unencrypted WIFI hotspot
- the communication terminal sends preset verification information to the network server;
- the communication terminal receives the verification information fed back by the network server, and compares with the locally preset verification information, and maintains a connection with the WIFI hotspot when the two are consistent.
- the method when the communication terminal determines that the verification information fed back by the network server is inconsistent with the local verification information, the method further includes:
- the communication terminal reselects and connects to an unencrypted WIFI hotspot; or the communication terminal reselects and connects to the unencrypted WIFI hotspot after deleting the WIFI hotspot from the unencrypted WIFI hotspot list; or ,
- the communication terminal directly exits the WIFI connection.
- the method before the communication terminal is connected to an unencrypted WIFI hotspot, the method further includes:
- the operator WIFI hotspot in the unencrypted WIFI hotspot searched by the communication terminal is removed according to the preset operator WIFI hotspot information.
- the method before the communications terminal sends the preset authentication information to the network server, the method further includes:
- the communication terminal encrypts the verification information to be sent; and/or,
- the method further includes:
- the embodiment of the present invention further provides a WIFI hotspot selection method, including:
- the communication terminal is connected to an unencrypted WIFI hotspot
- the communication terminal sends preset verification information to the network server, where the network server pre Have verification information;
- the communication terminal receives the verification information fed back by the network server, and compares with the locally preset verification information, and maintains a connection with the WIFI hotspot when the two are consistent.
- the method when the network server determines that the verification information sent by the communication terminal is inconsistent with the locally preset verification information, or when the communication terminal determines the verification information fed back by the network server When the local preset verification information is inconsistent, the method further includes:
- the communication terminal reselects and connects to an unencrypted WIFI hotspot; or the communication terminal reselects and connects to the unencrypted WIFI hotspot after deleting the WIFI hotspot from the unencrypted WIFI hotspot list; or ,
- the communication terminal directly exits the WIFI connection.
- the method before the communications terminal sends the preset authentication information to the network server, the method further includes:
- the method further includes: decrypting the received verification information.
- the method before the network server feeds back the verification information, the method further includes:
- the network server encrypts the verification information to be sent
- the method further includes: decrypting the received verification information.
- the communication terminal encrypts the verification information to be transmitted into binary verification data information.
- the network server encrypts the verification information to be transmitted into binary verification data information.
- the embodiment of the present invention further provides a communication terminal, including a WIFI communication module, a first sending module, a first receiving module, and a first processing module;
- the WIFI communication module is configured to connect to an unencrypted WIFI hotspot
- the first sending module is configured to send, to the network server, verification information preset locally by the communication terminal;
- the first receiving module is configured to receive the verification information fed back by the network server; the first processing module is configured to: the verification information received by the first receiving module and the verification preset locally by the communication terminal The information is compared, and the connection between the WIFI communication module and the WIFI hotspot is maintained when the two are consistent.
- the communication terminal further includes a reselection module, where the reselection module is configured to determine, at the first processing module, verification information received by the first receiving module and the communication When the verification information of the terminal local preset is inconsistent, reselect an unencrypted WIFI hotspot to connect with the WIFI communication module; or delete the WIFI hotspot from the unencrypted WIFI hotspot list, and then select an unencrypted WIFI hotspot. Connected to the WIFI communication module.
- the communication terminal further includes a selection module, configured to: before the WIFI communication module selects and connects an unencrypted WIFI hotspot, according to the preset operator WIFI hotspot information, the WIFI The operator WIFI hotspot in the unencrypted WIFI hotspot searched by the communication module is removed.
- the communication terminal further includes a first encryption module and a first decryption module, where the first encryption module is configured to send the verification information to the first sending module Before the web server encrypts the authentication information to be sent; and/or,
- the first decryption module is configured to connect the first receiving module to the first processing module Before the received verification information is compared with the verification information preset by the communication terminal, the verification information received by the first receiving module is decrypted.
- an embodiment of the present invention further provides a communication system, including a communication terminal and a network server;
- the communication terminal includes a WIFI communication module, a first sending module, a first receiving module, and a first processing module;
- the network server includes a second receiving module, a second sending module, and a second processing module;
- the WIFI communication module is configured to select and connect an unencrypted WIFI hotspot;
- the first sending module is configured to send the preset information preset by the communication terminal to the second receiving module;
- the second receiving module is configured to receive the verification information sent by the first sending module, where the second processing module is configured to verify the verification information received by the second receiving module and the network server preset preset The information is compared, and when the two are consistent, the second sending module sends the verification information to the first receiving module;
- the first receiving module is configured to receive the verification information sent by the second sending module; the first processing module is configured to: the verification information received by the first receiving module and the preset preset by the communication terminal The verification information is compared, and when the two are consistent, the connection between the WIFI communication module and the WIFI hotspot is maintained.
- the communication terminal further includes: a first encryption module and a first decryption module, the network server further includes a second decryption module and a second encryption module; wherein, the first encryption The module is configured to encrypt the verification information to be sent before the first sending module sends the verification information to the network server;
- the first decryption module is configured to: before the first processing module compares the verification information received by the first receiving module with the verification information preset by the communication terminal locally, before the first receiving The verification information received by the module is decrypted;
- the second decryption module is configured to receive, before the second processing module compares the verification information received by the second receiving module with the verification information preset by the network server, the second receiving module The verification information obtained is decrypted;
- the second encryption module is configured to perform encryption processing on the verification information to be sent before the second sending module sends the verification information to the communication terminal.
- an embodiment of the present invention further provides a computer storage medium, where the computer storage medium includes a set of instructions, when the instruction is executed, causing at least one processor to execute the WIFI hotspot selection method.
- the WIFI hotspot connection and selection method, the communication terminal and the system provided by the embodiment of the present invention selects and connects an unencrypted WIFI hotspot; sends the preset verification information to the network server, and the network server also presets the verification information; After receiving the verification information, the server compares with the locally preset verification information, and feeds back the verification information to the communication terminal when the two are consistent; the communication terminal receives the verification information fed back by the network server and compares with the locally preset verification information, For a while, it indicates that the currently connected WIFI hotspot is a hotspot that does not require secondary authentication, and maintains a connection with the WIFI hotspot.
- the communication terminal in the embodiment of the present invention automatically filters the WIFI hotspots that need to be verified twice in the unencrypted WIFI hotspot by using the preset verification information, and does not require the user to manually perform verification and selection, thereby simplifying the WIFI communication.
- the operation process greatly improves the satisfaction of the user experience.
- FIG. 1 is a schematic flowchart of a WIFI hotspot selection method according to Embodiment 1 of the present invention
- 2 is a schematic structural diagram of a communication system according to Embodiment 2 of the present invention
- FIG. 3 is a schematic structural diagram 1 of a communication terminal according to Embodiment 2 of the present invention.
- FIG. 4 is a schematic structural diagram 1 of a network server according to Embodiment 2 of the present invention.
- FIG. 5 is a schematic structural diagram 2 of a communication terminal according to Embodiment 2 of the present invention.
- FIG. 6 is a schematic structural diagram 3 of a communication terminal according to Embodiment 2 of the present invention.
- FIG. 7 is a schematic structural diagram 2 of a network server according to Embodiment 2 of the present invention.
- FIG. 8 is a schematic flowchart of a WIFI hotspot selection method in application scenario 1 according to Embodiment 3 of the present invention.
- FIG. 9 is a flow chart showing the process of processing the verification information by the network server in FIG. 8 according to an embodiment of the present invention.
- FIG. 10 is a schematic flowchart of a WIFI hotspot selection method in application scenario 2 according to Embodiment 3 of the present invention.
- FIG. 11 is a schematic flowchart of a WIFI hotspot selection method in application scenario 3 according to Embodiment 3 of the present invention. detailed description
- Embodiment 1 is a diagrammatic representation of Embodiment 1:
- the WIFI hotspot selection method includes the following steps: Step 101: The communication terminal selects and connects an unencrypted WIFI hotspot;
- Step 102 The communication terminal sends preset verification information to the network server, where the network server presets the verification information.
- Step 103 The network server receives the verification information sent by the communication terminal, and compares it with the locally preset verification information, and feeds back the verification information to the communication terminal when the two are consistent;
- Step 104 The communication terminal receives the verification information fed back by the network server, and compares with the locally preset verification information, and when the two are consistent, it indicates that the WIFI hotspot currently connected by the communication terminal does not need to be To be authenticated twice, keep the communication terminal connected to the WIFI hotspot.
- the communication terminal in this embodiment automatically filters the WIFI hotspots that need to be verified twice in the unencrypted WIFI hotspot through the preset verification information, and does not require the user to manually perform verification and selection, thereby simplifying the operation of the WIFI communication.
- the process greatly improves the satisfaction of the user experience.
- the communication terminal is prevented from erroneously accessing the unencrypted WIFI hotspot provided by the operator that requires secondary verification, thereby reducing the user's economic expenditure and further improving the satisfaction of the user experience.
- the communication terminal in the above step 101 may be a terminal device having a WIFI communication function such as a mobile phone or an IPAD; the method for selecting a WIFI hotspot may be any one of the following manners: Method 1: The communication terminal searches for an unencrypted WIFI hotspot to obtain no Encrypt the WIFI hotspot list, and then select one from the WIFI hotspot list to connect; when selecting, you can select a WIFI hotspot with the best signal quality, or you can select according to the order specified by the user, or even randomly select from the WIFI hotspot list. a WIFI hotspot, etc.;
- Method 2 Search for the corresponding WIFI hotspot directly according to the WIFI hotspot information typed by the user, and connect.
- step 103 when the network server determines that the verification information sent by the communication terminal is inconsistent with the locally preset verification information; the network server may notify the communication terminal to reselect an unencrypted WIFI hotspot and connect, and then proceeds to step 102; An unencrypted WIFI hotspot that does not require secondary verification, or no remaining unencrypted WIFI hotspots.
- step 104 when the communication terminal determines that the verification information fed back by the network server is inconsistent with the local verification information, it reselects and connects to an unencrypted WIFI hotspot. Then proceed to step 102 until an unencrypted WIFI hotspot that does not require secondary verification is selected, or there are currently no remaining unencrypted WIFI hotspots.
- the communication terminal may first remove the currently verified WIFI hotspot from the unencrypted WIFI hotspot list, and then reselect and connect to the one from the list. Encrypted WIFI hotspot; in some application scenarios Next, the communication terminal can directly exit the WIFI connection, for example, if there is only one current unencrypted WIFI hotspot.
- the step of culling the operator WIFI hotspot may be further included to improve the success rate of the subsequent verification.
- the operator WIFI hotspot in the unencrypted WIFI hotspot searched by the communication terminal may be removed according to the preset operator WIFI hotspot information.
- the WIFI hotspot information (such as a name, etc.) provided by each operator may be preset, and may be preset locally in the communication terminal, or may be preset on another device that the communication terminal can communicate to obtain information, and then After completing the unencrypted WIFI hotspot search to obtain the unencrypted WIFI hotspot list, the communication terminal removes the operator WIFI hotspot from the list according to the preset operator WIFI hotspot information.
- the verification information to be sent may be encrypted before the verification information is sent to the other party.
- the communication terminal encrypts the verification information to be transmitted before transmitting the verification information to the network server; and/or in the above step 103, the network server treats the verification information before transmitting the verification information to the communication terminal.
- the verification information sent is encrypted.
- the communication terminal and/or the network server further includes a process of decrypting the received verification information before comparing the received verification information with the locally preset verification information.
- the specific encryption and decryption algorithm may be selected according to a specific application scenario, and details are not described herein again.
- the communication terminal and/or the network server encrypts the verification information to be transmitted into binary verification data information.
- the verification information may theoretically be any data information that plays a role of distinguishing and identifying; in order to ensure the security and reliability of the information, the specific format and content may be set according to specific application scenarios.
- Embodiment 2 :
- This embodiment provides a communication system, as shown in FIG. 2, which includes a communication terminal 21 and The network server 22; wherein, as shown in FIG. 3 and FIG. 4 respectively, the communication terminal includes a WIFI communication module 211, a first sending module 212, a first receiving module 213, and a first processing module 214; and the network server includes a second receiving module. 221, a second sending module 222, and a second processing module 223;
- the WIFI communication module 211 of the communication terminal is configured to select and connect an unencrypted WIFI hotspot; the method for selecting the WIFI hotspot may be any one of the following methods:
- Method 1 The communication terminal searches for the unencrypted WIFI hotspot to obtain the unencrypted WIFI hotspot list, and then selects one of the WIFI hotspot lists to connect; when selecting, the WIFI hotspot with the best signal quality can be selected, or according to the order specified by the user. Select, you can even randomly select a WIFI hotspot from the list of WIFI hotspots, etc.
- Method 2 Search for the corresponding WIFI hotspot directly according to the WIFI hotspot information typed by the user, and connect.
- the first sending module 212 of the communication terminal is configured to send the verification information locally preset by the communication terminal to the network server after the WIFI hotspot is connected to an unencrypted WIFI hotspot;
- the second receiving module 221 of the network server is configured to receive the authentication information sent by the first sending module 212.
- the second processing module 223 of the network server is configured to compare the verification information received by the second receiving module 221 with the verification information preset by the network server, and send the verification to the communication terminal by using the second sending 223 module when the two are consistent.
- the first receiving module 213 of the communication terminal is configured to receive the verification information sent by the second sending module 223;
- the first processing module 214 of the communication terminal is configured to compare the verification information received by the first receiving module 213 with the locally preset verification information, and when the two are consistent, indicate that the WIFI hotspot is currently connected to the unencrypted WIFI hotspot. The second verification is not required, and the connection between the WIFI communication module 211 and the WIFI hotspot is maintained.
- the communication terminal may further include a reselection module configured to be in the pass
- the first processing module 214 of the signaling terminal determines that the authentication information received by the first receiving module 213 is inconsistent with the authentication information preset by the communication terminal, and reselects an unencrypted WIFI hotspot to be connected to the ⁇ 1?1 communication module 211. Or after the currently connected WIFI hotspot is deleted from the unencrypted WIFI hotspot list, an unencrypted WIFI hotspot is reselected and connected to the WIFI communication module 211.
- the communication terminal in this embodiment further includes a screening module 215, configured to remove the WIFI hotspot of the operator before the WIFI communication module selects and connects an unencrypted WIFI hotspot. Improve the success rate of subsequent verification.
- the screening module 215 may remove the operator WIFI hotspot in the unencrypted WIFI hotspot searched by the communication terminal according to the preset operator WIFI hotspot information.
- the WIFI hotspot information (such as a name, etc.) provided by each operator may be preset, and may be preset locally in the communication terminal, or may be preset on another device that the communication terminal can communicate to obtain information, and then After completing the unencrypted WIFI hotspot search to obtain the unencrypted WIFI hotspot list, the communication terminal removes the operator WIFI hotspot from the list according to the preset operator WIFI hotspot information.
- the communication terminal in this embodiment may further include a first encryption module 216 and a first decryption module 217, and the first encryption module 216 is configured to be in communication.
- the first sending module 212 of the terminal encrypts the verification information to be sent before transmitting the verification information to the network server.
- the first decryption module 217 is configured to receive the first receiving module 211 of the communication terminal at the first processing module 214. Before the verification information is compared with the verification information preset by the communication terminal, the verification information received by the first receiving module 211 is decrypted.
- the network server in this embodiment further includes a second decryption module 224 and a second encryption module 225; the second decryption module 224 is configured to be second in the second processing module 223 of the network server.
- the verification information received by the receiving module 221 is compared with the verification information preset by the network server, the verification information received by the second receiving module 221 is decrypted; the second encryption module 225 is configured to be the second sending in the network server.
- the module 222 Before transmitting the verification information to the communication terminal, the module 222 performs encryption processing on the verification information to be sent.
- the first encryption module 216 and the second encryption module 224 in this embodiment may specifically encrypt the verification information to be transmitted into binary verification data information to further ensure the security of the transmission process.
- the specific encryption algorithm can be selected according to the specific application scenario.
- the WIFI communication module 211 can be combined by a central processing unit (CPU), a digital signal processor (DSP) or a Field-Programmable Gate Array (FPGA) in the communication terminal.
- the first transmitting module 212 can be implemented by a transmitter in the communication terminal, and the first receiving module 213, the first encrypting module 216, and the first decrypting module 217 can be implemented by a receiver in the communication terminal, and the first processing module 214, reselecting
- the module and the screening module 215 can be implemented by a CPU, a DSP or an FPGA in the communication terminal, and the reselection module can be implemented by a CPU, a DSP or an FPGA in the communication terminal;
- the second receiving module 221 can be implemented by a receiver in the network server, and the second sending module
- the 222 can be implemented by a transmitter in the network server, and the second processing module 223, the second decryption module 224, and the second encryption module 225 can be implemented by a
- Embodiment 3 is a diagrammatic representation of Embodiment 3
- the single unencrypted WIFI hotspot may be specified by the user, or may only be currently searched for an unencrypted WIFI hotspot or the like. please Referring to Figure 8, it includes the following steps:
- Step 801 The communication terminal is connected to the unencrypted WIFI hotspot
- Step 802 The communication terminal encrypts the verification information to be sent, and encrypts the verification information into binary verification data information.
- a 1024-bit RSA port key may be specifically used;
- Step 803 The communication terminal sends the encrypted verification information to the corresponding network server.
- Step 804 The network server performs verification processing on the received verification information, and feeds back to the communication terminal when verifying that the verification information is consistent with the locally preset verification information. Encrypted authentication information;
- Step 805 The communication terminal receives the verification information sent by the network server.
- Step 806 The communication terminal decrypts the received verification information.
- Step 807 The communication terminal compares the decrypted verification information with the locally preset verification information.
- Step 808 The communication terminal determines whether the two are consistent, and if so, transposes step 809; otherwise, ends the process.
- Step 809 Maintain a connection with the WIFI hotspot.
- the network server performs a verification process on the received verification information, as shown in FIG. 9, and includes:
- Step 8041 Receive binary verification data information sent by the communication terminal.
- Step 8042 Determine whether the reception is successful, if yes, go to step 8043, otherwise, end the processing flow;
- Step 8043 Decrypt the received binary verification data information.
- Step 8044 Compare the decrypted verification information with the locally preset verification information.
- Step 8045 Determine whether the two are consistent. If yes, go to step 8046, otherwise, end the processing flow;
- Step 8046 Encrypt the local preset verification information, which may be encrypted and encrypted into binary verification data information by using a 1024-bit RSA encryption algorithm.
- Step 8047 Send the encrypted verification information to the communication terminal.
- Step 1001 The communication terminal searches for and saves the unencrypted WIFI hotspot, and obtains a list of unencrypted WIFI hotspots;
- Step 1002 The communication terminal selects an unencrypted WIFI hot spot from the unencrypted WIFI hotspot list to connect, and specifically selects the best WIFI hotspot to connect; of course, it can also be selected according to other rules set by the user;
- Step 1003 The communication terminal performs data encryption on the verification information to be sent, and encrypts the verification information to be sent into binary verification data information.
- Step 1004 The communication terminal sends the encrypted verification information to the corresponding network server.
- Step 1005 The communication terminal determines whether the verification information is successfully sent. If yes, go to the step
- Step 1006 The network server performs verification processing on the received verification information, and feeds back the encrypted verification information to the communication terminal when verifying the verification information that is locally preset.
- Step 1007 The communication terminal receives the verification information sent by the network server. ;
- Step 1008 The communication terminal determines whether the verification information is successfully received. If yes, go to the step
- Step 1009 The communication terminal decrypts the received verification information.
- Step 1010 The communication terminal compares the decrypted verification information with the locally preset verification information.
- Step 1011 The communication terminal determines whether the two are consistent, if yes, transpose step 1012; otherwise, Go to step 1013;
- Step 1012 Maintain a connection with the WIFI hotspot
- Step 1013 Delete the currently connected WIFI hotspot
- Step 1014 Determine whether there is no WIFI hotspot remaining in the unencrypted WIFI hotspot list, and if yes, transpose step 1002; otherwise, end the processing flow.
- the process of performing the verification process on the received authentication information by the network server in the above step 1006 is similar to the process shown in FIG. 9, and details are not described herein again.
- the unencrypted WIFI hotspots searched by the communication terminal are often multiple; the multiple unencrypted WIFI hotspots may include WIFI hotspots provided by the operator for secondary verification, including other businesses. WIFI hotspots that do not require secondary verification. Therefore, the WIFI hotspot provided by the merchant in the unencrypted WIFI hotspot can be first removed, and then the subsequent connection and verification process can be performed, which can improve the success rate of the verification.
- the communication terminal selects to connect to the WIFI hotspot, the communication terminal can connect to the WIFI hotspot designated by the user.
- Figure 11 The following process is illustrated by this example, as shown in Figure 11, which includes:
- Step 1101 The communication terminal searches for and saves only the unencrypted WIFI hotspot of the non-operator name, and obtains an unencrypted WIFI hotspot list;
- Step 1102 The communication terminal connects to the first unencrypted WIFI hotspot in the order specified by the user; of course, it may also be selected according to other rules set by the user;
- Step 1103 The communication terminal encrypts the verification information to be sent, and encrypts the verification information to be sent into binary verification data information.
- a 128-bit AES algorithm may be specifically used, and of course, other encryption algorithms may be used;
- Step 1104 The communication terminal sends the encrypted verification information to the corresponding network server.
- Step 1105 The communication terminal determines whether the verification information is successfully sent. If yes, go to step 1106, otherwise, transpose step 1113;
- Step 1106 The network server performs verification processing on the received verification information, and feeds back the encrypted verification information to the communication terminal when the verification is consistent with the verification information preset locally;
- Step 1107 The communication terminal receives the verification information sent by the network server. ;
- Step 1108 The communication terminal determines whether the verification information is successfully received. If yes, go to step 1109, otherwise, transpose step 1113;
- Step 1109 The communication terminal decrypts the received verification information.
- Step 1110 The communication terminal compares the decrypted verification information with the locally preset verification information.
- Step 1111 The communication terminal determines whether the two are consistent, if yes, transpose step 1112; otherwise, proceeds to step 1113;
- Step 1112 Maintain a connection with the WIFI hotspot
- Step 1113 Delete the currently connected WIFI hotspot
- Step 1114 Determine whether the user-specified WIFI hotspot remains in the unencrypted WIFI hotspot list, and if yes, transpose step 1102; otherwise, end the processing flow.
- the process of verifying the received verification information by the network server in the above step 1106 is similar to the processing procedure shown in FIG. 9, except that the network server encrypts the verification information, and specifically encrypts the 128-bit AES algorithm.
- the communication terminal automatically filters the WIFI hotspots that need to be verified twice in the unencrypted WIFI hotspot by using the preset verification information, and does not require the user to manually perform verification and selection, thereby simplifying the WIFI.
- the operation process of communication improves the satisfaction of the user experience to a large extent.
- the communication terminal is prevented from erroneously accessing the unencrypted WIFI hotspot provided by the operator and requiring secondary verification, thereby reducing the user's economic expenditure and further improving the user experience satisfaction.
- embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may employ hardware embodiments, software embodiments, or junctions. In the form of an embodiment of the software and hardware aspects. Moreover, the invention can be embodied in the form of one or more computer program products embodied on a computer usable storage medium (including but not limited to disk storage and optical storage, etc.) in which computer usable program code is embodied.
- a computer usable storage medium including but not limited to disk storage and optical storage, etc.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP14883598.6A EP3113528B1 (en) | 2014-02-27 | 2014-06-24 | Wifi hotspot connection and selection method, communications terminal and system |
US15/121,764 US20170094692A1 (en) | 2014-02-27 | 2014-06-24 | WIFI Hotspot Connection and Selection Method, Communications Terminal and System |
AU2014384393A AU2014384393B2 (en) | 2014-02-27 | 2014-06-24 | WIFI hotspot connection and selection method, communications terminal and system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410068004.3A CN104883682A (zh) | 2014-02-27 | 2014-02-27 | Wifi热点连接及选择方法、通信终端及系统 |
CN201410068004.3 | 2014-02-27 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015127734A1 true WO2015127734A1 (zh) | 2015-09-03 |
Family
ID=53950982
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/080565 WO2015127734A1 (zh) | 2014-02-27 | 2014-06-24 | Wifi热点连接及选择方法、通信终端及系统 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20170094692A1 (zh) |
EP (1) | EP3113528B1 (zh) |
CN (1) | CN104883682A (zh) |
AU (1) | AU2014384393B2 (zh) |
WO (1) | WO2015127734A1 (zh) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105187458A (zh) * | 2015-10-28 | 2015-12-23 | 青岛汇云无限物联网有限公司 | 一种基于硬件本地认证请求的WiFi芯片认证系统及认证方法 |
CN105898739A (zh) * | 2016-05-19 | 2016-08-24 | 郑建钦 | 一种防止热点非法冒充的方法 |
CN107484171A (zh) * | 2017-09-11 | 2017-12-15 | 宇龙计算机通信科技(深圳)有限公司 | 热点接入方法及系统 |
CN108810916B (zh) * | 2018-04-17 | 2022-08-12 | 深圳平安通信科技有限公司 | Wi-Fi热点推荐方法、装置及存储介质 |
CN112040564B (zh) * | 2020-08-25 | 2023-02-28 | 北京大米科技有限公司 | 信息传输方法、可读存储介质和电子设备 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090191892A1 (en) * | 2008-01-25 | 2009-07-30 | Garmin Ltd. | Integrating position-determining and wi-fi functions |
CN101877832A (zh) * | 2009-04-28 | 2010-11-03 | 财团法人资讯工业策进会 | 智能型热点连线系统及方法 |
CN103024929A (zh) * | 2012-12-20 | 2013-04-03 | 惠州Tcl移动通信有限公司 | 一种基于移动终端连接无线网络的方法及移动终端 |
CN103517372A (zh) * | 2012-06-21 | 2014-01-15 | 中国移动通信集团公司 | 一种无线局域网中选择接入点的方法、装置及系统 |
CN103533610A (zh) * | 2012-07-05 | 2014-01-22 | 瀚宇彩晶股份有限公司 | 无线网络选择方法及其可携式电子装置 |
CN104105167A (zh) * | 2013-04-15 | 2014-10-15 | 中兴通讯股份有限公司 | 终端Wi-Fi热点接入处理方法及装置 |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3951990B2 (ja) * | 2003-09-05 | 2007-08-01 | ブラザー工業株式会社 | 無線ステーション,プログラムおよび動作制御方法 |
JP2005252461A (ja) * | 2004-03-02 | 2005-09-15 | Nec Corp | コンテンツ配信システム |
JP4157079B2 (ja) * | 2004-08-04 | 2008-09-24 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 情報処理システム、通信方法、プログラム、記録媒体、及びアクセス中継サービスシステム |
JP5337879B2 (ja) * | 2008-09-29 | 2013-11-06 | 株式会社東芝 | 複数のネットワークアクセスポイントの事前評価 |
US8340700B2 (en) * | 2009-06-26 | 2012-12-25 | Oracle International Corporation | Enabling binary object attachment support for short messaging service |
JP4977229B2 (ja) * | 2010-03-30 | 2012-07-18 | 株式会社バッファロー | 通信を中継するための装置、方法、およびプログラム |
KR101587003B1 (ko) * | 2010-09-07 | 2016-01-20 | 삼성전자주식회사 | 무선 통신 시스템에서 와이 파이 연결 확인을 위한 장치 및 방법 |
US8479263B1 (en) * | 2011-03-07 | 2013-07-02 | Symantec Corporation | Method and system for detecting captive portals |
US8724603B2 (en) * | 2011-03-08 | 2014-05-13 | Blackberry Limited | Network access and a mobile station configured for the same |
CN102497638B (zh) * | 2011-12-21 | 2015-04-01 | 上海云联计算机系统有限公司 | 快速接入公共无线局域网的方法、系统及其移动终端 |
US20140328187A1 (en) * | 2012-01-02 | 2014-11-06 | Nokia Corporation | Network Connectivity Management in Wireless Apparatus |
KR101453973B1 (ko) * | 2012-07-02 | 2014-10-22 | 삼성전자주식회사 | 와이 파이 접속을 위한 방법 및 그 전자 장치 |
US9049405B2 (en) * | 2012-07-31 | 2015-06-02 | Hewlett-Packard Development Company, L.P. | Soft proofing system |
CN103118327A (zh) * | 2013-01-25 | 2013-05-22 | 无锡万事通科技有限公司 | 基于WiFi的信息传递系统及方法 |
-
2014
- 2014-02-27 CN CN201410068004.3A patent/CN104883682A/zh not_active Withdrawn
- 2014-06-24 US US15/121,764 patent/US20170094692A1/en not_active Abandoned
- 2014-06-24 EP EP14883598.6A patent/EP3113528B1/en active Active
- 2014-06-24 WO PCT/CN2014/080565 patent/WO2015127734A1/zh active Application Filing
- 2014-06-24 AU AU2014384393A patent/AU2014384393B2/en not_active Ceased
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090191892A1 (en) * | 2008-01-25 | 2009-07-30 | Garmin Ltd. | Integrating position-determining and wi-fi functions |
CN101877832A (zh) * | 2009-04-28 | 2010-11-03 | 财团法人资讯工业策进会 | 智能型热点连线系统及方法 |
CN103517372A (zh) * | 2012-06-21 | 2014-01-15 | 中国移动通信集团公司 | 一种无线局域网中选择接入点的方法、装置及系统 |
CN103533610A (zh) * | 2012-07-05 | 2014-01-22 | 瀚宇彩晶股份有限公司 | 无线网络选择方法及其可携式电子装置 |
CN103024929A (zh) * | 2012-12-20 | 2013-04-03 | 惠州Tcl移动通信有限公司 | 一种基于移动终端连接无线网络的方法及移动终端 |
CN104105167A (zh) * | 2013-04-15 | 2014-10-15 | 中兴通讯股份有限公司 | 终端Wi-Fi热点接入处理方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
EP3113528A4 (en) | 2017-01-18 |
EP3113528A1 (en) | 2017-01-04 |
CN104883682A (zh) | 2015-09-02 |
US20170094692A1 (en) | 2017-03-30 |
EP3113528B1 (en) | 2019-01-02 |
AU2014384393A1 (en) | 2016-10-13 |
AU2014384393B2 (en) | 2017-12-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5739072B2 (ja) | 共有エフェメラル・キー・データのセットを用いるエクスチェンジを符号化するためのシステム及び方法 | |
US10149158B2 (en) | Access method, system, and device of terminal, and computer storage medium | |
US20150264724A1 (en) | Method and system of establishing wireless communication connection | |
WO2016026317A1 (zh) | 一种wifi密码共享方法、终端和计算机存储介质 | |
CN104661219B (zh) | 一种无线设备的通讯方法、无线设备和服务器 | |
CN109040318B (zh) | Cdn网络的https连接方法及cdn节点服务器 | |
WO2015127734A1 (zh) | Wifi热点连接及选择方法、通信终端及系统 | |
US11108548B2 (en) | Authentication method, server, terminal, and gateway | |
CN108134789A (zh) | 通过云进行设备间数据同步的方法和云服务器 | |
US10097524B2 (en) | Network configuration method, and related apparatus and system | |
WO2015164999A1 (zh) | 虚拟卡下载方法、终端及中间设备 | |
US20150271163A1 (en) | Secure data transmission using multi-channel communication | |
CN111726801B (zh) | 一种网络安全控制方法 | |
JP5239123B2 (ja) | 無線lanシステム | |
US11652625B2 (en) | Touchless key provisioning operation for communication devices | |
CN104935435A (zh) | 登录方法、终端及应用服务器 | |
US20190037614A1 (en) | Method, apparatus, storage medium, and terminal for establishing a wi-fi connection | |
CN106685897B (zh) | 一种安全输入方法、装置和系统 | |
WO2015117437A1 (zh) | 一种文件加密方法、解密方法及装置 | |
CN112104460A (zh) | 一种非对称动态令牌加、解密算法的方法 | |
CN105517102A (zh) | 一种无线网络设备连接热点的方法、装置及设备 | |
WO2017004828A1 (zh) | 密码算法升级的方法及设备 | |
CN107508814A (zh) | 数据加密方法、解密方法、装置及系统 | |
CN103986640A (zh) | 一种可保障用户通讯内容安全的即时通讯方法及其系统 | |
CN104980266A (zh) | 数据通信方法和系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14883598 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15121764 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REEP | Request for entry into the european phase |
Ref document number: 2014883598 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2014883598 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2014384393 Country of ref document: AU Date of ref document: 20140624 Kind code of ref document: A |