CN114697966A - Wireless network security access method and communication system - Google Patents
Wireless network security access method and communication system Download PDFInfo
- Publication number
- CN114697966A CN114697966A CN202011631591.4A CN202011631591A CN114697966A CN 114697966 A CN114697966 A CN 114697966A CN 202011631591 A CN202011631591 A CN 202011631591A CN 114697966 A CN114697966 A CN 114697966A
- Authority
- CN
- China
- Prior art keywords
- base station
- terminal
- target base
- wireless network
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000004891 communication Methods 0.000 title claims abstract description 25
- 239000000523 sample Substances 0.000 claims abstract description 89
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 claims abstract description 65
- 238000012795 verification Methods 0.000 claims description 38
- 230000003993 interaction Effects 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 10
- 238000012545 processing Methods 0.000 description 5
- 238000004364 calculation method Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
技术领域technical field
本申请涉及企业互联网技术领域,尤其涉及一种无线网络安全接入方法及通信系统。The present application relates to the field of enterprise Internet technologies, and in particular, to a wireless network security access method and communication system.
背景技术Background technique
企业互联网将人、数据和机器等通过网络连接起来,从而实现人与机器之间、机器与机器之间的相互控制和数据共享。终端接入无线网络是指终端与基站连接,并通过与基站之间的信号收发完成终端在对应无线网络中上传和下载数据。Enterprise Internet connects people, data and machines through the network, so as to realize mutual control and data sharing between people and machines and between machines. Accessing a terminal to a wireless network means that the terminal is connected to the base station, and the terminal uploads and downloads data in the corresponding wireless network by sending and receiving signals with the base station.
终端接入无线网络时通常会向对应的基站发送接入请求,并在接入请求中写入与无线网络的SSID对应的接入密码,例如,SSID为“beijing01”,其对应的接入密码往往都是人为设定的密码,如“12345678”,这样,如果终端在接入无线网络“beijing01”时,如果发送的接入请求中带有接入密码“12345678”,就可以成功连接。通常,不同的终端接入同一个无线网络时所使用的接入密码是相同的,这样,就容易出现只要获知无线网络对应的接入密码,无论任何终端都可以接入,一旦非法终端接入该网络,就会对该无线网络以及同时连入该无线网络的其它终端造成安全危害。When the terminal accesses the wireless network, it usually sends an access request to the corresponding base station, and writes the access password corresponding to the SSID of the wireless network in the access request. For example, if the SSID is "beijing01", the corresponding access password It is usually an artificially set password, such as "12345678". In this way, if the terminal accesses the wireless network "beijing01", if the access request sent contains the access password "12345678", it can successfully connect. Usually, the access passwords used by different terminals to access the same wireless network are the same. In this way, it is easy to see that as long as the access password corresponding to the wireless network is known, any terminal can access. Once an illegal terminal accesses The network will cause security hazards to the wireless network and other terminals connected to the wireless network at the same time.
发明内容SUMMARY OF THE INVENTION
本申请提供了一种无线网络安全接入方法及通信系统,以提高终端接入无线网络的安全性。The present application provides a wireless network security access method and communication system, so as to improve the security of a terminal accessing a wireless network.
第一方面,本申请提供了一种无线网络安全接入方法,应用于终端,所述方法包括:向目标基站发送探测请求帧probe request,以在网络管理平台验证所述终端接入所述目标基站的无线网络的权限;接收所述目标基站在所述终端具有接入所述目标基站的无线网络的权限时反馈的探测响应帧probe response,所述probe response包括所述目标基站的SSID和指定字段;根据所述终端的MAC地址、所述目标基站的SSID以及所述指定字段生成接入密码;使用所述接入密码接入所述目标基站的无线网络。In a first aspect, the present application provides a wireless network security access method, which is applied to a terminal. The method includes: sending a probe request frame probe request to a target base station to verify that the terminal accesses the target on a network management platform The authority of the wireless network of the base station; receive the probe response frame probe response fed back by the target base station when the terminal has the authority to access the wireless network of the target base station, the probe response includes the SSID of the target base station and the specified field; generate an access password according to the MAC address of the terminal, the SSID of the target base station and the specified field; use the access password to access the wireless network of the target base station.
第二方面,本申请提供了一种无线网络安全接入方法,应用于基站,所述方法包括:接收终端发送的探测请求帧probe request;向网络管理平台发送所述probe request,以在所述网络管理平台验证所述终端接入所述目标基站的无线网络的权限;接收所述网络管理平台的验证结果;如果所述验证结果为所述终端具有接入所述目标基站的无线网络的权限,则生成探测响应帧probe response,所述probe response包括所述目标基站的SSID和指定字段;向所述终端发送所述probe response,以供所述终端根据所述目标基站的SSID和所述指定字段接入所述目标基站的无线网络。In a second aspect, the present application provides a wireless network security access method, which is applied to a base station. The method includes: receiving a probe request frame probe request sent by a terminal; sending the probe request to a network management platform to The network management platform verifies the right of the terminal to access the wireless network of the target base station; receives the verification result of the network management platform; if the verification result is that the terminal has the right to access the wireless network of the target base station , then generate a probe response frame probe response, and the probe response includes the SSID of the target base station and the specified field; send the probe response to the terminal, so that the terminal can use the SSID of the target base station and the specified field for the terminal. field to access the wireless network of the target base station.
第三方面,本申请提供了一种无线网络安全接入方法,应用于网络管理平台,所述方法包括:接收目标基站发送的探测请求帧probe request;从所述probe request中获取终端信息;根据所述终端信息验证所述终端是否具有接入所述目标基站的无线网络的权限,生成验证结果,其中,如果所述验证结果为所述终端具有接入所述目标基站的无线网络的权限,则所述验证结果包括所述目标基站的SSID和指定字段,以供所述终端根据所述目标基站的SSID和所述指定字段接入所述目标基站的无线网络;向所述目标基站发送所述验证结果。In a third aspect, the present application provides a wireless network security access method, which is applied to a network management platform. The method includes: receiving a probe request frame probe request sent by a target base station; obtaining terminal information from the probe request; The terminal information verifies whether the terminal has the right to access the wireless network of the target base station, and generates a verification result, wherein, if the verification result is that the terminal has the right to access the wireless network of the target base station, Then the verification result includes the SSID of the target base station and the specified field, so that the terminal can access the wireless network of the target base station according to the SSID of the target base station and the specified field; The verification result is described.
第四方面,本申请提供了一种通信系统,所述通信系统包括终端、与所述终端对应的目标基站和网络管理平台,其中,所述终端、所述目标基站和所述网络管理平台用于执行如上所述的无线网络安全接入方法。In a fourth aspect, the present application provides a communication system, the communication system includes a terminal, a target base station corresponding to the terminal, and a network management platform, wherein the terminal, the target base station and the network management platform use for implementing the wireless network security access method as described above.
由以上技术方案可知,终端在确定需要接入的目标基站之后,通过向目标基站发送探测请求帧probe request以验证接入目标基站的无线网络的权限,并且在网络管理平台确定终端具有接入权限时,通过目标基站向终端发送包含目标基站的SSID和指定字段的探测响应帧probe response,这样,终端就可以使用终端的MAC地址、目标基站的SSID以及指定字段同时生成接入密码,以接入目标基站的无线网络。在本申请中终端的MAC地址具有唯一性,指定字段也是网络管理平台针对该终端的请求发送的,因此,对于该终端也具有唯一性,由此可以有效避免其他终端的非法连接,从而提高终端接入无线网络的安全性。It can be seen from the above technical solutions that after determining the target base station to be accessed, the terminal sends a probe request frame probe request to the target base station to verify the right to access the wireless network of the target base station, and the network management platform determines that the terminal has the access right. When the target base station sends a probe response frame probe response containing the SSID of the target base station and the specified field to the terminal, the terminal can use the MAC address of the terminal, the SSID of the target base station and the specified field to generate an access password at the same time to access the The wireless network of the target base station. In this application, the MAC address of the terminal is unique, and the specified field is also sent by the network management platform for the terminal's request. Therefore, it is also unique for the terminal, which can effectively avoid illegal connections of other terminals, thereby improving the efficiency of the terminal. Access to wireless network security.
附图说明Description of drawings
为了更清楚地说明本申请的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,对于本领域普通技术人员而言,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to illustrate the technical solutions of the present application more clearly, the accompanying drawings that need to be used in the embodiments will be briefly introduced below. Other drawings can also be obtained from these drawings.
图1为本申请实施例提供的一种无线网络安全接入方法的流程图;FIG. 1 is a flowchart of a wireless network security access method provided by an embodiment of the present application;
图2为本申请实施例提供的一种通信系统的结构示意图;FIG. 2 is a schematic structural diagram of a communication system provided by an embodiment of the present application;
图3为本申请实施例提供的一种无线网络通信信号覆盖示意图;3 is a schematic diagram of a wireless network communication signal coverage provided by an embodiment of the present application;
图4为本申请实施例提供的一种终端的结构示意图;FIG. 4 is a schematic structural diagram of a terminal according to an embodiment of the present application;
图5为本申请实施例提供的一种目标基站的结构示意图;FIG. 5 is a schematic structural diagram of a target base station according to an embodiment of the present application;
图6为本申请实施例提供的一种网络管理平台的结构示意图。FIG. 6 is a schematic structural diagram of a network management platform according to an embodiment of the present application.
具体实施方式Detailed ways
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整的描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
终端在接入无线网络时会向对应的基站发送接入请求,并在接入请求中携带固定的接入密码,由于该接入密码可以被任意终端获知或者窃取,一旦非法终端获得接入密码后,就会对该无线网络以及接入该无线网络中的终端的安全产生威胁。为了解决上述问题,本申请提供了一种无线网络安全接入方法,具体如下:When the terminal accesses the wireless network, it will send an access request to the corresponding base station, and carry a fixed access password in the access request. Since the access password can be known or stolen by any terminal, once the illegal terminal obtains the access password Then, the security of the wireless network and the terminals accessing the wireless network will be threatened. In order to solve the above problems, the present application provides a wireless network security access method, which is as follows:
图1为本申请实施例提供的一种无线网络安全接入方法的流程图,如图1所示,所述方法包括:FIG. 1 is a flowchart of a wireless network security access method provided by an embodiment of the present application. As shown in FIG. 1 , the method includes:
S1、基站向周围发散无线网络通信信号。S1. The base station radiates wireless network communication signals to the surroundings.
图2为本申请实施例提供的一种通信系统的结构示意图,如图2所示,通信系统包括终端1、基站2和网络管理平台3,其中,终端1与网络管理平台3通过基站2进行数据交互。基站2向周围发散无线网络通信信号,以供各终端发现可以使用的基站。FIG. 2 is a schematic structural diagram of a communication system according to an embodiment of the present application. As shown in FIG. 2 , the communication system includes a terminal 1 , a base station 2 and a network management platform 3 , wherein the terminal 1 and the network management platform 3 communicate with each other through the base station 2 Data interaction. The base station 2 radiates wireless network communication signals to the surroundings, so that each terminal can find a base station that can be used.
S2、终端接收所述无线网络通信信号。S2. The terminal receives the wireless network communication signal.
本申请实施例中终端可以为手机、PC、平板电脑和其它可接入基站的电子设备,终端启动无线网络搜索之后,可以接收到周围基站发送的无线网络通信信号,以发现可以接入的基站。In this embodiment of the present application, the terminal may be a mobile phone, a PC, a tablet computer, or other electronic devices that can access base stations. After the terminal starts a wireless network search, it can receive wireless network communication signals sent by surrounding base stations to discover accessible base stations. .
本申请实施例提供的网络管理平台用于监管终端与基站的工作,主要用于记录终端接入无线网络的权限,以及无线网络的连接信息。因此,终端需要预先将终端信息注册至网络管理平台,以公告网络管理平台记录终端信息,并生成和记录终端对应的无线网络的接入权限。具体如下:The network management platform provided by the embodiment of the present application is used to supervise the work of the terminal and the base station, and is mainly used to record the authority of the terminal to access the wireless network and the connection information of the wireless network. Therefore, the terminal needs to register the terminal information to the network management platform in advance, so as to announce the network management platform to record the terminal information, and to generate the access authority of the wireless network corresponding to the recorded terminal. details as follows:
S101、终端在网络管理平台注册终端信息,以在所述网络管理平台存储所述终端接入各基站的无线网络的鉴权信息,用以验证终端的接入权限。S101. The terminal registers terminal information on a network management platform, so as to store the authentication information of the terminal accessing the wireless network of each base station on the network management platform, so as to verify the access authority of the terminal.
终端信息可以为终端的设备ID、终端的MAC地址等具有唯一标识作用的信息,还可以带有终端限制或者指定接入的无线网络信息,这样,网络管理平台就可以根据终端信息生成与终端准确对应的终端权限。网络管理平台中会预先存储无线网络信息,这些无线网络信息可以为基站的SSID、BSSID等,还可以包括无线网络限制或者指定接入的终端信息。网络管理平台结合终端信息和无线网络信息,根据一定的规则生成终端权限,生成规则可以为终端对某些SSID或者BSSID对应的无线网络限制接入、无线网络对非指定设备ID或者MAC地址的终端限制接入等,例如,终端A限制接入SSID为“beijing03”的无线网络,则网络管理平台根据终端A的终端信息生成对应的终端权限为限制接入“beijing03”。需要说明的是,相对于这些被限制接入的无线网络,未被限制接入的无线网络,也就是有权接入的无线网络,可以称为终端的授权无线网络,例如SSID为“beijing01”的无线网络。The terminal information can be information with a unique identification function such as the device ID of the terminal, the MAC address of the terminal, etc., and can also contain information about the wireless network that the terminal restricts or specifies to access. The corresponding terminal permissions. The wireless network information is pre-stored in the network management platform. The wireless network information may be the SSID, BSSID, etc. of the base station, and may also include wireless network restrictions or terminal information designated for access. The network management platform combines terminal information and wireless network information to generate terminal permissions according to certain rules. The generation rules can be that the terminal restricts access to the wireless network corresponding to certain SSIDs or BSSIDs, and the wireless network restricts access to the wireless network corresponding to some SSID or BSSID, and the wireless network does not specify the terminal ID or MAC address of the terminal. Access restriction, for example, terminal A restricts access to the wireless network with SSID "beijing03", the network management platform generates the corresponding terminal authority according to terminal A's terminal information as restricted access "beijing03". It should be noted that, compared to these restricted wireless networks, the unrestricted wireless network, that is, the wireless network that has the right to access, can be called the authorized wireless network of the terminal, for example, the SSID is "beijing01" wireless network.
当终端仅位于一个基站的无线网络通信信号的覆盖范围内时,该基站即为目标基站。当终端同时位于多个基站的无线网络通信信号的覆盖范围内时,终端需要从这些基站中选择需要进行无线网络通信的目标基站。例如,图3为本申请实施例提供的一种无线网络通信信号覆盖示意图,如图3所示,终端1位于基站A、基站B和基站C的无线网络通信信号的覆盖范围内,终端1接收到基站A、B、C发送的无线网络通信信号时,可以从中选择需要连接的基站,例如根据基站对应的无线网络的网络状态,选择需要接入的目标基站,如根据信号强度、信号质量等指标进行选择,其中,信号强度例如路径损耗(Path loss)等;信号质量例如接收信号强度指示(Received signal strength indication,RSSI)等。终端会选择一个信号强度最高,信号质量最优的无线网络进行连接,例如选择基站A,那么基站A即为目标基站。When the terminal is only within the coverage of the wireless network communication signal of one base station, the base station is the target base station. When the terminal is simultaneously located within the coverage of wireless network communication signals of multiple base stations, the terminal needs to select a target base station that needs to perform wireless network communication from these base stations. For example, FIG. 3 is a schematic diagram of wireless network communication signal coverage provided by an embodiment of the application. As shown in FIG. 3 , terminal 1 is located within the coverage of wireless network communication signals of base station A, base station B, and base station C, and terminal 1 receives When the wireless network communication signals sent by base stations A, B, and C are sent, the base station to be connected can be selected from them. For example, the target base station to be accessed can be selected according to the network status of the wireless network corresponding to the base station, such as signal strength, signal quality, etc. An indicator is selected, wherein the signal strength is, for example, a path loss (Path loss), etc.; the signal quality is, for example, a received signal strength indication (Received signal strength indication, RSSI) and the like. The terminal will select a wireless network with the highest signal strength and the best signal quality to connect to, for example, if base station A is selected, then base station A is the target base station.
S3、终端向目标基站发送探测请求帧probe requset。S3. The terminal sends a probe request frame probe requset to the target base station.
在确定目标基站之后,终端需要进一步获取接入目标基站的无线网络的连接信息,此时,终端生成探测请求帧probe request,probe request包括终端信息,例如终端的MAC地址、设备ID等,并发送至目标基站,以请求无线网络的连接信息。After determining the target base station, the terminal needs to further obtain the connection information of the wireless network accessing the target base station. At this time, the terminal generates a probe request frame probe request, the probe request includes terminal information, such as the terminal's MAC address, device ID, etc., and sends to the target base station to request connection information for the wireless network.
S4、目标基站接收所述终端发送的probe request。S4. The target base station receives the probe request sent by the terminal.
S5、目标基站向网络管理平台发送所述probe request。S5. The target base station sends the probe request to the network management platform.
目标基站起到转发的作用,在接收到终端发送的probe request之后,需要将其转发至网络管理平台以进行处理。The target base station plays the role of forwarding. After receiving the probe request sent by the terminal, it needs to forward it to the network management platform for processing.
S6、网络管理平台接收所述目标基站发送的probe request。S6. The network management platform receives the probe request sent by the target base station.
S7、网络管理平台根据所述probe request,验证所述终端接入所述目标基站的无线网络的权限,生成验证结果。S7. The network management platform verifies the right of the terminal to access the wireless network of the target base station according to the probe request, and generates a verification result.
S8、网络管理平台向目标基站发送所述验证结果。S8. The network management platform sends the verification result to the target base station.
S9、目标基站接收所述验证结果。S9. The target base station receives the verification result.
为了提高终端连接无线网络的安全性,需要对终端的接入权限进行验证。终端并非可以接入任意无线网络,出于运营商、工作区域等限制,终端会限制所使用的无线网络,同时,无线网络也会限制所能够接入的终端,综合上述两方面限制,终端有权接入的无线网络可以称为授权无线网络,终端无权接入的无线网络可以称为非授权无线网络。In order to improve the security of the terminal connecting to the wireless network, the access authority of the terminal needs to be verified. Terminals cannot access any wireless network. Due to restrictions on operators and work areas, terminals will limit the wireless networks they can use. At the same time, wireless networks will also limit the terminals that can be accessed. Combining the above two limitations, terminals have A wireless network to which the terminal has the right to access may be called an authorized wireless network, and a wireless network to which a terminal has no right to access may be called an unauthorised wireless network.
上文介绍到网络管理平台用于管理终端和基站的各类信息,其中,网络管理平台用于存储终端对应的授权无线网络信息,终端在网络管理平台注册之后,网络管理平台就会生成与终端对应的授权无线网络信息,同时网络管理平台还存储有各基站的接入条件,这样,网络管理平台就可以根据终端对应的授权无线网络信息和基站的接入条件来确定终端是否具有接入目标基站的无线网络的权限。As described above, the network management platform is used to manage various information of terminals and base stations. The network management platform is used to store the authorized wireless network information corresponding to the terminal. After the terminal is registered on the network management platform, the network management platform will generate a The corresponding authorized wireless network information, and the network management platform also stores the access conditions of each base station. In this way, the network management platform can determine whether the terminal has an access target according to the authorized wireless network information corresponding to the terminal and the access conditions of the base station. The permissions of the base station's wireless network.
只要终端在网络管理平台中注册了终端信息,网络管理平台中就会记录有终端的终端信息以及对应的终端权限,例如,网络管理平台中记录的终端信息是终端的MAC地址,也可以是终端的设备ID等可以唯一标识终端的信息。当网络管理平台接收到目标基站转发的probe request之后,就可以根据该probe request中携带的终端信息查询到与该终端对应的终端权限,例如,终端1在网络管理平台中存储的终端信息为MAC地址a,终端权限为有权接入SSID为A的无线网络,如果终端1向目标基站发送probe request,那么该proberequest会携带MAC地址a,网络管理平台可以根据MAC地址a查询到终端1对应的终端权限“有权接入SSID为A的无线网络”。As long as the terminal registers the terminal information in the network management platform, the terminal information of the terminal and the corresponding terminal authority will be recorded in the network management platform. For example, the terminal information recorded in the network management platform is the MAC address of the terminal, or the terminal information that can uniquely identify the terminal, such as the device ID. After the network management platform receives the probe request forwarded by the target base station, it can query the terminal authority corresponding to the terminal according to the terminal information carried in the probe request. For example, the terminal information stored in the network management platform of terminal 1 is MAC Address a, the terminal authority is the right to access the wireless network with SSID A. If terminal 1 sends a probe request to the target base station, the probe request will carry the MAC address a. The network management platform can query the corresponding terminal 1 according to the MAC address a. The terminal authority "has the right to access the wireless network with SSID A".
在一种实现方式中,网络管理平台同时可以获知目标基站的SSID,如果目标基站的SSID为A,则网络管理平台可以直接判断终端具有接入目标基站的无线网络的权限;如果目标基站的SSID不是A,则网络管理平台可以直接判断终端不具有接入目标基站的无线网络的权限。网络管理平台根据上述判断生成验证结果,此时,验证结果就是验证通过,或者验证未通过。In an implementation manner, the network management platform can also learn the SSID of the target base station. If the SSID of the target base station is A, the network management platform can directly determine that the terminal has the right to access the wireless network of the target base station; If it is not A, the network management platform can directly determine that the terminal does not have the right to access the wireless network of the target base station. The network management platform generates a verification result according to the above judgment. In this case, the verification result is that the verification passes or the verification fails.
其中,如果验证未通过,网络管理平台还可以不向目标基站发送任何数据。如果验证通过,网络管理平台需要同时在验证结果中添加目标基站的SSID和指定字段,以作为无线网络的连接参数。还可以添加连接有效时间等限制信息,以在终端长时间未接入目标基站时,令上述无线网络连接信息失效,以确保无线网络通信的安全性。其中,指定字段可以为网络管理平台随机生成的一个字段,也可以为网络管理平台从其保存的特定数据库中抽取的一个字段,该特定数据库可以保存大量字段,也可以为网络管理平台从密码库中选择的密码因子,其中,密码库由多个密码对组成,密码对由一个密码和一个密码因子对应组成。Wherein, if the verification fails, the network management platform may not send any data to the target base station. If the verification is passed, the network management platform needs to add the SSID of the target base station and the specified field to the verification result at the same time as the connection parameters of the wireless network. Restriction information such as connection valid time can also be added to invalidate the above wireless network connection information when the terminal does not access the target base station for a long time, so as to ensure the security of wireless network communication. The specified field may be a field randomly generated by the network management platform, or a field extracted from a specific database saved by the network management platform. The cipher factor selected in , wherein the cipher base consists of multiple cipher pairs, and the cipher pair consists of one cipher and one cipher factor correspondingly.
在另一种实现方式中,网络管理平台不会直接判断终端是否具有接入目标基站的无线网络的权限,而是将查询到的终端权限作为验证结果发送至目标基站,由目标基站根据该验证结果来进一步判断终端是否具有接入的权限。如果终端具有接入权限,则目标基站生成无线网络接入信息获取请求,或者目标基站将可以接入的判断结果发送至终端,并接收终端的无线网络接入信息获取请求,目标基站再将无线网络接入信息获取请求发送至网络管理平台,由网络管理平台生成对应的无线网络接入信息,包括目标基站的SSID和指定字段;如果终端不具有接入权限,则目标基站生成无权限接入信息并反馈至终端,或者目标基站不再向终端发送任何数据。In another implementation manner, the network management platform does not directly determine whether the terminal has the right to access the wireless network of the target base station, but sends the queried terminal authority as a verification result to the target base station, and the target base station will verify the terminal according to the verification result. As a result, it is further judged whether the terminal has access authority. If the terminal has the access authority, the target base station generates a wireless network access information acquisition request, or the target base station sends the access judgment result to the terminal, and receives the terminal's wireless network access information acquisition request, and the target base station then sends the wireless network access information to the terminal. The network access information acquisition request is sent to the network management platform, and the network management platform generates the corresponding wireless network access information, including the SSID and specified fields of the target base station; if the terminal does not have the access authority, the target base station generates an unauthorized access information is fed back to the terminal, or the target base station no longer sends any data to the terminal.
可见,通过上述过程,经过网络管理平台对终端接入无线网络权限的管控,可以有效防止没有注册过的非法终端,或者不具有对应接入权限的终端接入无线网络,从而保证无线网络的安全性。It can be seen that through the above process, the network management platform can effectively prevent illegal terminals that have not been registered, or terminals that do not have corresponding access rights from accessing the wireless network, thereby ensuring the security of the wireless network. sex.
S10、目标基站根据所述验证结果生成探测响应帧probe response。S10. The target base station generates a probe response frame probe response according to the verification result.
如果终端验证通过,即终端具有接入目标基站的无线网络的权限,此时,目标基站需要生成探测响应帧probe response,以向终端发送无线网络的接入信息,如目标基站的SSID和指定字段。If the terminal passes the verification, that is, the terminal has the right to access the wireless network of the target base station, at this time, the target base station needs to generate a probe response frame probe response to send the access information of the wireless network to the terminal, such as the SSID of the target base station and the specified field .
在本申请实施例中,为了保证数据传输的安全性,防止目标基站的SSID以及指定字段的泄露,所述probe request和所述probe response基于同一套数据交互识别规则生成。例如将秘钥索引信息写入probe response中的BSSID字段,同时将目标基站的SSID信息写入probe response中的SSID字段,由上文可知,为了保护无线网络的安全性,需要利用私有协议定义SSID字段,在本实施例中,利用私有协议定义SSID字段后得到协议后的SSID信息,其由目标基站的SSID字段和与私有协议对应的私有头部信息构成。In the embodiment of the present application, in order to ensure the security of data transmission and prevent the leakage of the SSID of the target base station and the specified field, the probe request and the probe response are generated based on the same set of data interaction identification rules. For example, the key index information is written into the BSSID field in the probe response, and the SSID information of the target base station is written into the SSID field in the probe response. As can be seen from the above, in order to protect the security of the wireless network, it is necessary to use a private protocol to define the SSID field, in this embodiment, the SSID field after the protocol is obtained after the SSID field is defined by the private protocol, which is composed of the SSID field of the target base station and the private header information corresponding to the private protocol.
为了更进一步提高目标基站的SSID字段的保密性,可以对目标基站的SSID字段进行不可见处理,例如,对目标基站的SSID字段进行预设逻辑运算处理,如原有的目标基站的SSID字段都是ascii表中的可见字符,一旦非法终端窃取了目标基站的SSID字段,则可以直接发现目标基站对应的无线网络。对目标基站的SSID字段进行处理后,例如,对SSID字段中的每个字符进行加、减、乘、除等逻辑运算,如原有字符为ascii,预设逻辑运算为-30,则处理后SSID字段为ascii-30,因为其不符合SSID字段的通常格式,非特定的终端无法识别处理后SSID字段,即无法发现目标基站对应的无线网络,但是,特定的终端(例如支持私有协议的终端)可以识别不可见处理后SSID字段,可以将其作为正常的SSID字段进行使用,从而避免了非法终端对目标基站的无线网络的发现以及接入,提高无线网络的接入安全性。In order to further improve the confidentiality of the SSID field of the target base station, invisible processing can be performed on the SSID field of the target base station, for example, a preset logical operation processing is performed on the SSID field of the target base station. is a visible character in the ascii table. Once an illegal terminal steals the SSID field of the target base station, it can directly discover the wireless network corresponding to the target base station. After processing the SSID field of the target base station, for example, perform logical operations such as addition, subtraction, multiplication, and division on each character in the SSID field. If the original character is ascii, and the default logical operation is -30, then after processing The SSID field is ascii-30, because it does not conform to the usual format of the SSID field, and non-specific terminals cannot identify the processed SSID field, that is, the wireless network corresponding to the target base station cannot be found. ) can identify the invisible processed SSID field and use it as a normal SSID field, thereby avoiding the discovery and access of the wireless network of the target base station by illegal terminals, and improving the access security of the wireless network.
S11、目标基站向终端发送所述probe response。S11. The target base station sends the probe response to the terminal.
S12、终端接收目标基站发送的probe response。S12. The terminal receives the probe response sent by the target base station.
S13、终端根据probe response生成接入密码。S13, the terminal generates an access password according to the probe response.
具体的,终端解析probe response以获取目标基站的SSID和指定字段,终端根据目标基站的SSID和指定字段生成接入密码,如果指定字段为密码因子,在一种情况下,为了进一步保证终端接入无线网络的安全性,还需要终端根据密码因子找到对应的密码,并将该密码作为真正的指定字段来生成接入密码。由于终端已经在网络管理平台中进行注册,因此,终端所使用的密码库与平台所使用的密码库相关联,如果两者使用同一个密码因子,在各自的密码库中查询到的密码应该是相同的。Specifically, the terminal parses the probe response to obtain the SSID of the target base station and the specified field, and the terminal generates an access password according to the SSID of the target base station and the specified field. If the specified field is a password factor, in one case, in order to further ensure the terminal access The security of the wireless network also requires the terminal to find the corresponding password according to the password factor, and use the password as a real designated field to generate the access password. Since the terminal has been registered in the network management platform, the password database used by the terminal is associated with the password database used by the platform. If the two use the same password factor, the password queried in the respective password database should be identical.
当终端确定了目标基站的SSID和指定字段之后,可以生成接入密码,具体如下:After the terminal determines the SSID and specified fields of the target base station, it can generate an access password, as follows:
根据终端的MAC地址的6个字节以及目标基站的SSID中对应的BSSID中的前三个字节,通过psk2+ccmp的加密方式,得到12个字节长度的接入密码。具体地,给出一种示例,F(num)=终端的MAC地址的6个字节的偶数字节与BSSID中的前三个字节对应相加,得到接入密码的前6个字节,终端的MAC地址的6个字节的奇数字节与BSSID中的前三个字节对应相加,得到接入密码的后6个字节,最后在这12个字节上分别加上指定字段得到接入密码。示例的,通过上述算法可以得到接入密码为:According to the 6 bytes of the MAC address of the terminal and the first three bytes of the corresponding BSSID in the SSID of the target base station, through the encryption method of psk2+ccmp, an access password with a length of 12 bytes is obtained. Specifically, an example is given, where F(num)=the even-numbered bytes of the 6-byte MAC address of the terminal are correspondingly added to the first three bytes in the BSSID to obtain the first 6 bytes of the access password , the 6-byte odd bytes of the terminal's MAC address are correspondingly added to the first three bytes in the BSSID to obtain the last 6 bytes of the access password, and finally the specified 12 bytes are added respectively. field to get the access code. For example, the access password obtained through the above algorithm is:
stamac[0]+bssid[0]+num,stamac[1]+num,stamac[2]+bssid[1]+num,stamac[3]+num,stamac[4]+bssid[2]+num,stamac[5]+num,stamac[0]+num,stamac[1]+bssid[0]+num,stamac[2]+num,stamac[3]+bssid[1]+num,stamac[4]+num,stamac[5]+bssid[2]+num。stamac[0]+bssid[0]+num, stamac[1]+num, stamac[2]+bssid[1]+num, stamac[3]+num, stamac[4]+bssid[2]+num, stamac[5]+num, stamac[0]+num, stamac[1]+bssid[0]+num, stamac[2]+num, stamac[3]+bssid[1]+num, stamac[4]+ num, stamac[5]+bssid[2]+num.
其中,stamac代表终端的MAC地址,[]代表字节,num代表指定字段。Among them, stamac represents the MAC address of the terminal, [] represents bytes, and num represents the specified field.
通常可以在0-255范围内对目标基站的BSSID的前三个字节进行定义,这也就会对应256种不同的接入密码算法。当然,还可以采用其它的算法,例如利用目标基站的SSID名称进行运算,在指定字节后面加上指定字段,或者在指定字节后面减去指定字段等。可见,可以根据多种运算逻辑计算得到接入密码,这也就保证了接入密码的不唯一性,增加了接入密码的破解难度,从而提高终端接入无线网络的安全性。同时,由上述可以看出,终端对应的接入密码与终端本身具有唯一对应性,也就是说,不同的终端连接同一无线网络所使用的接入密码不同,这也可以避免接入密码在不同终端之间的复用。Usually, the first three bytes of the BSSID of the target base station can be defined in the range of 0-255, which corresponds to 256 different access password algorithms. Of course, other algorithms can also be used, for example, using the SSID name of the target base station for calculation, adding a specified field after a specified byte, or subtracting a specified field after a specified byte, etc. It can be seen that the access password can be calculated according to various operation logics, which also ensures the non-uniqueness of the access password, increases the difficulty of cracking the access password, and improves the security of the terminal accessing the wireless network. At the same time, it can be seen from the above that the access password corresponding to the terminal has a unique correspondence with the terminal itself, that is to say, the access passwords used by different terminals to connect to the same wireless network are different, which can also avoid the access passwords in different Multiplexing between terminals.
S14、终端根据所述接入密码接入所述目标基站的无线网络。S14. The terminal accesses the wireless network of the target base station according to the access password.
终端将接入密码发送至目标基站,以连接无线网络。当目标基站接收到接入密码之后,需要对接入密码进行验证。具体的,目标基站也需要按照预设生成规则根据目标基站的SSID和指定字段生成验证密码,并将验证密码与接入密码进行对比,以判断终端是否可以接入无线网络,如果验证密码与接入密码一致,则终端可以接入无线网络;如果验证密码与接入密码不一致,则终端不可以接入无线网络。The terminal sends the access code to the target base station to connect to the wireless network. After the target base station receives the access password, it needs to verify the access password. Specifically, the target base station also needs to generate a verification password according to the SSID and specified fields of the target base station according to the preset generation rules, and compare the verification password with the access password to determine whether the terminal can access the wireless network. If the login password is the same, the terminal can access the wireless network; if the verification password is inconsistent with the access password, the terminal cannot access the wireless network.
目标基站可以在接收到终端发送的接入密码之后再生成验证密码,但是,为了提高终端的接入速度,目标基站可以在向终端发送probe response之后就立即生成验证密码。由上文公开了多样的密码生成规则可以得知,如果其它终端想要接入该无线网络,由于其无法获知可以接入该无线网络的终端的MAC地址、无线网络的SSID、指定字段、更无法获知接入密码的计算方法,也就难以接入该无线网络,从而有效保证无线网络的安全性。The target base station can generate the verification password after receiving the access password sent by the terminal. However, in order to improve the access speed of the terminal, the target base station can generate the verification password immediately after sending the probe response to the terminal. It can be known from the various password generation rules disclosed above that if other terminals want to access the wireless network, they cannot know the MAC address of the terminal that can access the wireless network, the SSID of the wireless network, the specified fields, and more. If the calculation method of the access password cannot be known, it is difficult to access the wireless network, thereby effectively ensuring the security of the wireless network.
可见,上述生成接入密码、验证密码以及接入验证的过程均为终端、基站、网络管理平台自动计算的过程,无需人为输入等操作,所以可以降低人为等外力的干预,从而增强密码的安全性,降低密码泄露的风险。It can be seen that the above processes of generating access passwords, verifying passwords and access verification are all processes of automatic calculation by terminals, base stations, and network management platforms, and operations such as human input are not required, so the intervention of human and other external forces can be reduced, thereby enhancing the security of passwords to reduce the risk of password leakage.
为了避免密码泄露,网络管理平台需要周期性地更新指定字段,这样,同一个终端在不同周期内使用的接入密码也不同,非法终端将更加难以破解接入密码。当指定字段更新之后,终端会与目标基站断连,并根据指定字段重新生成接入密码再次进行连接。In order to avoid password leakage, the network management platform needs to update the specified fields periodically. In this way, the same terminal uses different access passwords in different periods, making it more difficult for illegal terminals to crack the access password. After the specified field is updated, the terminal will disconnect from the target base station and re-generate the access password according to the specified field to connect again.
图4为本申请实施例提供的一种终端的结构示意图,如图4所示,所述终端包括:接收器11、处理器12和发送器13;FIG. 4 is a schematic structural diagram of a terminal provided by an embodiment of the present application. As shown in FIG. 4 , the terminal includes: a receiver 11, a processor 12, and a transmitter 13;
所述发送器13用于向目标基站发送探测请求帧probe request,以在网络管理平台验证所述终端接入所述目标基站的无线网络的权限;The transmitter 13 is configured to send a probe request frame probe request to the target base station, so as to verify the authority of the terminal to access the wireless network of the target base station on the network management platform;
所述接收器11用于接收所述目标基站在所述终端具有接入所述目标基站的无线网络的权限时反馈的探测响应帧probe response,所述probe response包括所述目标基站的SSID和指定字段;The receiver 11 is configured to receive a probe response frame probe response fed back by the target base station when the terminal has the right to access the wireless network of the target base station, where the probe response includes the SSID of the target base station and the specified field;
所述处理器12用于根据所述终端的MAC地址、所述目标基站的SSID以及所述指定字段生成接入密码;The processor 12 is configured to generate an access password according to the MAC address of the terminal, the SSID of the target base station and the specified field;
所述发送器13还用于使用所述接入密码接入所述目标基站的无线网络。The transmitter 13 is further configured to use the access code to access the wireless network of the target base station.
图5为本申请实施例提供的一种目标基站的结构示意图,如图5所示,所述目标基站包括:接收器21、处理器22和发送器23;FIG. 5 is a schematic structural diagram of a target base station provided by an embodiment of the present application. As shown in FIG. 5 , the target base station includes: a receiver 21, a processor 22, and a transmitter 23;
所述接收器21用于接收终端发送的探测请求帧probe request;The receiver 21 is configured to receive the probe request frame probe request sent by the terminal;
所述发送器23用于向网络管理平台发送所述probe request,以在所述网络管理平台验证所述终端接入所述目标基站的无线网络的权限;The transmitter 23 is configured to send the probe request to the network management platform, so as to verify the right of the terminal to access the wireless network of the target base station on the network management platform;
所述接收器21还用于接收所述网络管理平台的验证结果;The receiver 21 is further configured to receive the verification result of the network management platform;
所述处理器22用于如果所述验证结果为所述终端具有接入所述目标基站的无线网络的权限,则生成探测响应帧probe response,所述probe response包括所述目标基站的SSID和指定字段;The processor 22 is configured to generate a probe response frame probe response if the verification result is that the terminal has the right to access the wireless network of the target base station, and the probe response includes the SSID of the target base station and the specified field;
所述发送器23还用于向所述终端发送所述probe response,以供所述终端根据所述目标基站的SSID和所述指定字段接入所述目标基站的无线网络。The transmitter 23 is further configured to send the probe response to the terminal, so that the terminal can access the wireless network of the target base station according to the SSID of the target base station and the specified field.
图6为本申请实施例提供的一种网络管理平台的结构示意图,如图6所示,所述网络管理平台包括:接收器31、处理器32和发送器33;FIG. 6 is a schematic structural diagram of a network management platform provided by an embodiment of the present application. As shown in FIG. 6 , the network management platform includes: a receiver 31, a processor 32, and a transmitter 33;
所述接收器31用于接收目标基站发送的探测请求帧probe request;The receiver 31 is configured to receive the probe request frame probe request sent by the target base station;
所述处理器32用于从所述probe request中获取终端信息;The processor 32 is configured to obtain terminal information from the probe request;
所述处理器32还用于根据所述终端信息验证所述终端是否具有接入所述目标基站的无线网络的权限,生成验证结果,其中,如果所述验证结果为所述终端具有接入所述目标基站的无线网络的权限,则所述验证结果包括所述目标基站的SSID和指定字段,以供所述终端根据所述目标基站的SSID和所述指定字段接入所述目标基站的无线网络;The processor 32 is further configured to verify, according to the terminal information, whether the terminal has the right to access the wireless network of the target base station, and generate a verification result, wherein if the verification result is that the terminal has access to the wireless network. the authority of the wireless network of the target base station, the verification result includes the SSID of the target base station and a specified field, so that the terminal can access the wireless network of the target base station according to the SSID of the target base station and the specified field network;
所述发送器33还用于向所述目标基站发送所述验证结果。The transmitter 33 is further configured to send the verification result to the target base station.
由以上技术方案可知,终端在确定需要接入的目标基站之后,通过向目标基站发送探测请求帧probe request以验证接入目标基站的无线网络的权限,并且在网络管理平台确定终端具有接入权限时,通过目标基站向终端发送包含目标基站的SSID和指定字段的探测响应帧probe response,这样,终端就可以使用终端的MAC地址、目标基站的SSID以及指定字段同时生成接入密码,以接入目标基站的无线网络。在本申请中终端的MAC地址具有唯一性,指定字段也是网络管理平台针对该终端的请求发送的,因此,对于该终端也具有唯一性,由此可以有效避免其他终端的非法连接,从而提高终端接入无线网络的安全性。It can be seen from the above technical solutions that after determining the target base station to be accessed, the terminal sends a probe request frame probe request to the target base station to verify the right to access the wireless network of the target base station, and the network management platform determines that the terminal has the access right. When the target base station sends a probe response frame probe response containing the SSID of the target base station and the specified field to the terminal, the terminal can use the MAC address of the terminal, the SSID of the target base station and the specified field to generate an access password at the same time to access the The wireless network of the target base station. In this application, the MAC address of the terminal is unique, and the specified field is also sent by the network management platform for the terminal's request. Therefore, it is also unique for the terminal, which can effectively avoid illegal connections of other terminals, thereby improving the efficiency of the terminal. Access to wireless network security.
本领域的技术人员可以清楚地了解到本发明实施例中的技术可借助软件加必需的通用硬件平台的方式来实现。基于这样的理解,本发明实施例中的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例或者实施例的某些部分所述的方法。Those skilled in the art can clearly understand that the technology in the embodiments of the present invention can be implemented by means of software plus a necessary general hardware platform. Based on such understanding, the technical solutions in the embodiments of the present invention may be embodied in the form of software products in essence or the parts that make contributions to the prior art, and the computer software products may be stored in a storage medium, such as ROM/RAM , magnetic disk, optical disk, etc., including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in various embodiments or some parts of the embodiments of the present invention.
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本发明的其它实施方案。本申请旨在涵盖本发明的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本发明的一般性原理并包括本发明未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本发明的真正范围和精神由下面的权利要求指出。Other embodiments of the invention will readily occur to those skilled in the art upon consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses or adaptations of the invention which follow the general principles of the invention and which include common knowledge or conventional techniques in the art not disclosed by the invention . The specification and examples are to be regarded as exemplary only, with the true scope and spirit of the invention being indicated by the following claims.
应当理解的是,本申请并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本申请的范围仅由所附的权利要求来限制。It is to be understood that the present application is not limited to the precise structures described above and shown in the accompanying drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202011631591.4A CN114697966A (en) | 2020-12-31 | 2020-12-31 | Wireless network security access method and communication system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202011631591.4A CN114697966A (en) | 2020-12-31 | 2020-12-31 | Wireless network security access method and communication system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN114697966A true CN114697966A (en) | 2022-07-01 |
Family
ID=82134014
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202011631591.4A Pending CN114697966A (en) | 2020-12-31 | 2020-12-31 | Wireless network security access method and communication system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN114697966A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115474187A (en) * | 2022-08-26 | 2022-12-13 | 杭州锐思客技术有限公司 | Method, system, electronic device and medium for wireless automatic discovery and network distribution |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102685745A (en) * | 2012-04-23 | 2012-09-19 | 深圳市江波龙电子有限公司 | Wireless access point (AP) equipment authentication method and system |
| CN105072617A (en) * | 2015-07-24 | 2015-11-18 | 江苏省公用信息有限公司 | Authentication method based on WIFI access |
| CN105959950A (en) * | 2015-12-02 | 2016-09-21 | 珠海网博信息科技股份有限公司 | Wireless access system and connection method thereof |
| CN107295519A (en) * | 2017-08-21 | 2017-10-24 | 深圳市信锐网科技术有限公司 | A kind of wireless network access method, apparatus and system |
| CN108966218A (en) * | 2018-06-22 | 2018-12-07 | 四川斐讯信息技术有限公司 | A kind of wireless network access method and system based on management terminal control |
| US20190228192A1 (en) * | 2018-01-25 | 2019-07-25 | Seiko Epson Corporation | Terminal device, communication system, recording medium |
-
2020
- 2020-12-31 CN CN202011631591.4A patent/CN114697966A/en active Pending
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102685745A (en) * | 2012-04-23 | 2012-09-19 | 深圳市江波龙电子有限公司 | Wireless access point (AP) equipment authentication method and system |
| CN105072617A (en) * | 2015-07-24 | 2015-11-18 | 江苏省公用信息有限公司 | Authentication method based on WIFI access |
| CN105959950A (en) * | 2015-12-02 | 2016-09-21 | 珠海网博信息科技股份有限公司 | Wireless access system and connection method thereof |
| CN107295519A (en) * | 2017-08-21 | 2017-10-24 | 深圳市信锐网科技术有限公司 | A kind of wireless network access method, apparatus and system |
| US20190228192A1 (en) * | 2018-01-25 | 2019-07-25 | Seiko Epson Corporation | Terminal device, communication system, recording medium |
| CN108966218A (en) * | 2018-06-22 | 2018-12-07 | 四川斐讯信息技术有限公司 | A kind of wireless network access method and system based on management terminal control |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115474187A (en) * | 2022-08-26 | 2022-12-13 | 杭州锐思客技术有限公司 | Method, system, electronic device and medium for wireless automatic discovery and network distribution |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP4504192B2 (en) | Secure access to subscription modules | |
| US9197420B2 (en) | Using information in a digital certificate to authenticate a network of a wireless access point | |
| CN112566119B (en) | Terminal authentication method, device, computer equipment and storage medium | |
| US11751052B2 (en) | Credential information processing method and apparatus for network connection, and application (APP) | |
| CN113992387B (en) | Resource management method, device, system, electronic equipment and readable storage medium | |
| KR20160127167A (en) | Multi-factor certificate authority | |
| JP2003500923A (en) | Method, computer program and device for initializing secure communication and exclusively pairing devices | |
| CN101986598B (en) | Authentication method, server and system | |
| CN105100095A (en) | Secure interaction method and apparatus for mobile terminal application program | |
| CN106302332B (en) | User data access control method, device and system | |
| CN112311769B (en) | Method, system, electronic device and medium for security authentication | |
| CN103929419B (en) | Access control method and device | |
| CN113079506B (en) | Network security authentication method, device and equipment | |
| CN110519753A (en) | Access method, device, terminal and readable storage medium storing program for executing | |
| KR20160055130A (en) | Method and system related to authentication of users for accessing data networks | |
| US20240380611A1 (en) | Data transmission method, related apparatus, device, and storage medium | |
| WO2019056971A1 (en) | Authentication method and device | |
| CN110868294A (en) | Key updating method, device and equipment | |
| EP1890461B1 (en) | Secure access to a subscription module | |
| CN114697966A (en) | Wireless network security access method and communication system | |
| CN113784354A (en) | Request conversion method and device based on gateway | |
| CN114698057B (en) | Wireless network access method and communication system | |
| CN115967623B (en) | Device management method, device, electronic device, and storage medium | |
| CN112702743B (en) | Network data monitoring and protecting method based on artificial intelligence | |
| CN118215046B (en) | A method for obtaining a device public key certificate and a communication device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |