WiFi hot spot safe login method and system

A technology for secure login and login method, applied in the field of realizing terminal secure login to WiFi hotspots, which can solve the problems of protocol incompatibility, lack of security, and easy leakage.

Active Publication Date: 2015-06-24
SUN YAT SEN UNIV
View PDF6 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] There is a big disadvantage in the secure login method of the above-mentioned WiFi hotspot: for the hotspot that adopts the personal login method, its pre-shared key PSK needs to be disclosed to all users who are allowed to log in to the hotspot, and key management is difficult and easy to leak
[0019] The analysis shows that schemes (1) and (3) are aimed at personal login methods, but they are not compatible with the relevant standard protocols of IEEE 802.11; scheme (2) discloses the login key to the terminal user and stores the key locally, which lacks security
These schemes have great defects in implementation difficulty and security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • WiFi hot spot safe login method and system
  • WiFi hot spot safe login method and system
  • WiFi hot spot safe login method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0129] The present invention will be further described below in conjunction with the accompanying drawings, but the embodiments of the present invention are not limited thereto.

[0130] Such as figure 1 As shown, user Alice’s terminal M1 is located within the wireless and mobile signal coverage of hotspot AP1 and base station BS1, user Bob’s terminal M2 is located within the signal coverage of hotspot AP2 and base station BS2, Bob is an owner of hotspot AP1, and AP1’s None of the owners are Alice herself or her contacts.

[0131] In the login method, when users Alice and Bob are in a session with the server SVR, Alice requests the SVR to add Bob, the owner of the hotspot AP1, as a contact through the terminal M1. The process is as follows:

[0132] (1) User Alice selects hotspot AP1 from the hotspot list of terminal M1 and selects one of all non-contact owners of AP1, and then sends a request to add the owner as a contact to the server SVR through M1, and the request include...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a WiFi hot spot safe login method and system. A label which is unique globally is embedded in an SSID of a hot spot, a server inquires description information of the hot spot with the label as a key clue, and a user identifies peripheral hot spots through the hot spot description information sent from the server; a contact relation is established between the user with the hot spot login request and owners of the hot spots so that the user can log into all the hot spots with the owners being the user or contacts of the user; the server located in the internet is maintained, a temporary key needed by the user in a personal login mode is generated through a pre-shared key, a terminal used by the user is in handshake communication with the hot spots through the temporary key distributed from the server, and the possibility of pre-shared key leakage or cracking is lowered. The user logs into the hot spots working in any login mode through an account number registered in the server and a password, the different login modes of the hot spots can be switched at will, and the whole switching process is transparent to the user.

Description

technical field [0001] The present invention relates to the field of wireless communication, in particular to a method and a system for realizing safe login of a terminal to a WiFi hotspot. Background technique [0002] WiFi is a wireless local area network communication technology that follows the IEEE 802.11 protocol standard. A WiFi hotspot (access point, AP) can provide Internet access services to logged-in users. Currently, the commonly used WiFi security login protocol WPA (Wi-Fi protected access) There are two ways to log in, personal and business. Each hotspot has an SSID (service set identifier) ​​that can be set arbitrarily with a maximum length of 32 bytes. The hotspot periodically broadcasts the SSID on its channel for terminals to scan for identification and login connections. [0003] In the personal login mode, the typical process for a user to log in to a hotspot through a terminal is as follows: the user and the hotspot agree on a pre-shared key PSK (pre-sh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0838H04L63/06H04L63/08
Inventor 吴裔劳斌农革
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products