WiFi Internet surfing connecting authentication method and system based on asymmetric full-process encryption

An authentication method and Internet technology, applied in the field of WiFi Internet connection authentication based on asymmetric whole-process encryption, can solve the problems of wireless WiFi network end security risks, phishing, inability to achieve end-end security and whole-process encryption authentication, etc., to avoid website effect of fishing

Active Publication Date: 2015-01-07
HEFEI CITY COULD DATA CENT
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing Internet system, users usually find wireless access hotspots through mobile terminals. These wireless hotspots are usually free, or a basic encrypted access or default encrypted access is done in the wireless router, which gives websites phishing and AP deception. , network hijacking, and brute force cracking provide a lot of opportunities, bringing great troubles and even huge losses to merchants and mobile users, such as using WiFi for online payment
In response to these security risks, although some large operators and equipment manufacturers have taken some measures to control Internet access, such as Radius authentication, WiFidog authentication, Chilipot, etc., they still cannot achieve terminal security and full encryption authentication , so the use of network security, especially the security risks at the end of the wireless WiFi network is very serious, and it has always been an area actively explored by network security and information security personnel.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • WiFi Internet surfing connecting authentication method and system based on asymmetric full-process encryption
  • WiFi Internet surfing connecting authentication method and system based on asymmetric full-process encryption
  • WiFi Internet surfing connecting authentication method and system based on asymmetric full-process encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] A method for authenticating a WiFi Internet access connection based on asymmetric full encryption, including: first, the cloud authentication server defines an encrypted access policy for an access controller, and the policy mainly defines an encryption method based on M-WAPI and a mobile terminal accessing the access policy. secondly, the cloud authentication server distributes the encrypted access policy to the designated access controller based on the M-WAPI protocol; thirdly, when the mobile terminal accesses WiFi for the first time, it needs to report its device MAC address to the access controller, and the access controller will This MAC address is reported to the cloud authentication server; then, based on the M-WAPI protocol, the access controller distributes the encrypted access policy to the mobile terminal that accesses WiFi for the first time; then, once the mobile terminal finds a WiFi hotspot, it uses the encrypted access policy to detect the WiFi hotspot. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a WiFi Internet surfing connecting authentication method based on asymmetric full-process encryption. The WiFi Internet surfing connecting authentication method includes the steps that a cloud authentication server defines an encryption access strategy for an access controller; the cloud authentication server issues the encryption access strategy to the assigned access controller based on the M-WAPI protocol; the access controller issues the encryption access strategy based on the M-WAPI protocol to a mobile terminal accessing the WiFi for the first time; the mobile terminal sends an encrypted authentication request to the cloud authentication server for authentication through the encryption access strategy, and if authentication is successful, the mobile terminal can access the Internet. The invention further discloses a WiFi Internet surfing connecting authentication system based on the asymmetric full-process encryption. By means of the asymmetric full-process encryption method and system, the mobile terminal can be rapidly connected to legal WiFi hot points, phishing, AP cheating, network hijacking, brute force attacking and the like can be effectively avoided, and it is guaranteed that users can safely use WiFi network resources without worries to protect sensitive information of the users from leakage and stealing.

Description

technical field [0001] The invention relates to the technical field of WiFi Internet security access, in particular to a method and system for authenticating a WiFi Internet access connection based on asymmetric whole-process encryption. Background technique [0002] With the popularization and use of smart mobile terminals, mobile Internet access has become an indispensable part of daily life, especially its convenience, which has also brought many security problems, such as phishing websites, AP deception, domain name hijacking, and brute force cracking Wait. [0003] In the existing Internet system, users usually find wireless access hotspots through mobile terminals. These wireless hotspots are usually free, or a basic encrypted access or default encrypted access is done in the wireless router, which gives websites phishing and AP deception. , Network hijacking, and brute force cracking provide a lot of opportunities, bringing great troubles and even huge losses to merc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 张宏伟李晓洁
Owner HEFEI CITY COULD DATA CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products