Wireless network connection method, device and system

A wireless network connection and wireless access point technology, which is applied in the field of network security, can solve problems such as data security threats, and achieve the effect of improving security

Active Publication Date: 2018-09-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem that the data transmitted by the user terminal to the fake public Wi-Fi and the data inside the user terminal will be threatened by security after the user uses the existing access method to make the user terminal access the fake public Wi-Fi , the embodiment of the present invention provides a wireless network connection method, device and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless network connection method, device and system
  • Wireless network connection method, device and system
  • Wireless network connection method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0056] For ease of understanding, some technical concepts involved in the embodiments of the present invention are firstly introduced.

[0057] public key and private key

[0058] The public key refers to the public key, which does not need to be kept secret, and the decrypting party can obtain it through various channels; while the private key refers to the key held only by the encrypting party itself, which needs to be kept secret. A public key corresponds to a private key; the public key and the private key together form an asymmetric encryption method. Asymmetric encryption means that the information encrypted with the public key can only be decrypted with the corresponding private key, and the information encrypted with the priva...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a wireless network connection method, device and system, belonging to the field of network security. The present invention sends the first access request to the wireless access point; sends the second access request to the authentication server; verifies whether the wireless access point belongs to the trusted wireless access point, and communicates with the user terminal when it belongs to the trusted wireless access point Perform the first identity authentication, negotiate with the user terminal to generate a master key; send the master key corresponding to the user name to the wireless access point; negotiate with the user terminal to establish an encrypted wireless network connection according to the master key; The data transmitted by the public Wi-Fi and the data inside the user terminal will be threatened by security; only the trusted wireless access point can obtain the master key corresponding to the user name, so as to communicate with the user terminal according to their respective Some master key negotiations establish an encrypted wireless network connection, which improves the security effect of the data transmitted by the user terminal and the internal data of the user terminal.

Description

technical field [0001] Embodiments of the present invention relate to the field of network security, in particular to a wireless network connection method, device and system. Background technique [0002] With the widespread use of user terminals, wireless networks have become an important form for user terminals to access the Internet. A common wireless network is a Wi-Fi (Wireless-Fidelity, wireless fidelity) network. Most of the current commercial places provide public Wi-Fi for users to use for free. [0003] In the prior art, the ways for user terminals to access public Wi-Fi mainly include: no password access, verification code access and single password access. Among them: passwordless access means that the user terminal sends an access request to the wireless access point after obtaining the SSID (Service Set Identifier) ​​of the public Wi-Fi, and the wireless access point directly allows the user to The terminal accesses the public Wi-Fi; the verification code ac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/06H04W76/12H04L29/06H04W12/03H04W12/0431
CPCH04L63/083H04L63/0876H04W12/04H04W12/06H04W76/12
Inventor 朱戈唐文宁杨志伟付火平陈水明徐森圣
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products