Wireless network connecting method, device and system

A wireless network connection and wireless access point technology, which is applied in the field of network security, can solve problems such as data security threats, and achieve the effect of improving security

Active Publication Date: 2016-05-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem that the data transmitted by the user terminal to the fake public Wi-Fi and the data inside the user terminal will be threatened by security after the user uses the existing access method to make the user terminal access the fake public Wi-Fi , the embodiment of the present invention provides a wireless network connection method, device and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless network connecting method, device and system
  • Wireless network connecting method, device and system
  • Wireless network connecting method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0056] For ease of understanding, some technical concepts involved in the embodiments of the present invention are firstly introduced.

[0057] public key and private key

[0058] The public key refers to the public key, which does not need to be kept secret, and the decrypting party can obtain it through various channels; while the private key refers to the key held only by the encrypting party itself, which needs to be kept secret. A public key corresponds to a private key; the public key and the private key together form an asymmetric encryption method. Asymmetric encryption means that the information encrypted with the public key can only be decrypted with the corresponding private key, and the information encrypted with the priva...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a wireless network connecting method, device and system belonging to the network security field. According to the invention, a first access request is sent to a wireless access point; an authentication server sends a second access request; whether the wireless access point belongs to a trust wireless access point is authenticated, when the wireless access point belongs to the trust wireless access point, first identity authentication is carried out with a user terminal, a main secrete key is generated through negotiating with the user terminal; the main secrete key corresponding to a user name is sent to the wireless access point; an encrypted wireless network connection is built by negotiating with the user terminal according to the main secrete key; the problems that the data transmitted to the counterfeit public Wi-Fi by the user terminal and the data in the user terminal are in security threat are solved; only the trust wireless access point can obtain the secrete key corresponding to the user name; therefore, the encrypted wireless network connection is built by negotiating with the user terminal according to the main secrete key; the data security of the data transmitted by the user terminal and the data in the user terminal is improved.

Description

technical field [0001] Embodiments of the present invention relate to the field of network security, in particular to a wireless network connection method, device and system. Background technique [0002] With the widespread use of user terminals, wireless networks have become an important form for user terminals to access the Internet. A common wireless network is a Wi-Fi (Wireless-Fidelity, wireless fidelity) network. Most of the current commercial places provide public Wi-Fi for users to use for free. [0003] In the prior art, the ways for user terminals to access public Wi-Fi mainly include: no password access, verification code access and single password access. Among them: passwordless access means that after the user terminal obtains the SSID (ServiceSetIdentifier, Service Set Identifier) ​​of public Wi-Fi, it sends an access request to the wireless access point. Access to the public Wi-Fi; verification code access means that the user terminal needs to obtain the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04W76/02H04L29/06H04W12/03H04W12/0431
CPCH04L63/083H04L63/0876H04W12/04H04W12/06H04W76/12
Inventor 朱戈唐文宁杨志伟付火平陈水明徐森圣
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products