Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless network connection method, device and system

一种无线网络连接、无线网络的技术,应用在无线网络连接方法,装置及系统领域,能够解决数据数据安全威胁等问题

Active Publication Date: 2017-08-11
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problem that the data transmitted by the user terminal to the fake public Wi-Fi and the data inside the user terminal will be threatened by security after the user uses the existing access method to make the user terminal access the fake public Wi-Fi , the embodiment of the present invention provides a wireless network connection method, device and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless network connection method, device and system
  • Wireless network connection method, device and system
  • Wireless network connection method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0060] For ease of understanding, some technical concepts involved in the embodiments of the present invention are firstly introduced.

[0061] public key and private key

[0062] The public key refers to the public key, which does not need to be kept secret, and the decrypting party can obtain it through various channels; while the private key refers to the key held only by the encrypting party itself, which needs to be kept secret. A public key corresponds to a private key; the public key and the private key together form an asymmetric encryption method. Asymmetric encryption means that the information encrypted with the public key can only be decrypted with the corresponding private key, and the information encrypted with the priva...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless network connection method, device and system, belonging to the field of network security. The method comprises the following steps: a user terminal sends an access request to a wireless access point; the wireless access point sends a key query request to an authentication server; the authentication server sends a corresponding key query result to the wireless access point when the wireless access point belongs to a trusted wireless access point; the wireless access point acquires a corresponding authentication key; the user terminal generates an authentication key corresponding to the own MAC address; and the wireless access point and the user terminal negotiate to establish an encrypted wireless network connection according to the separately-owned authentication keys. According to the wireless network connection method, device and system disclosed by the invention, the problem that both the data transmitted to the fake public Wi-Fi by the user terminal and the internal data of the user terminal are subject to security threats can be solved; and only the trusted wireless access point can acquire the authentication key to establish the encrypted wireless network connection with the user terminal, and the effect of improving the security of the data transmitted by the user terminal and the internal data of the user terminal can be achieved.

Description

technical field [0001] Embodiments of the present invention relate to the field of network security, in particular to a wireless network connection method, device and system. Background technique [0002] With the widespread use of user terminals, wireless networks have become an important form for user terminals to access the Internet. A common wireless network is a Wi-Fi (Wireless-Fidelity, wireless fidelity) network. Most of the current commercial places provide public Wi-Fi for users to use for free. [0003] In the prior art, the ways for user terminals to access public Wi-Fi mainly include: no password access, verification code access and single password access. User terminals refer to terminals that can search and connect to Wi-Fi networks . Among them: passwordless access means that the user terminal sends an access request to the wireless access point after obtaining the SSID (Service SetIdentifier) ​​of the public Wi-Fi, and the wireless access point directly al...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/08
CPCH04W12/04H04W12/06H04W12/08H04L63/061H04L63/0876H04W76/10H04W12/0431H04W12/041
Inventor 朱戈
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products