Wireless access point authentication method, device and system

A wireless access point and authentication method technology, applied in the field of devices and systems, and wireless access point authentication methods, can solve problems such as user terminal security threats, and achieve the effect of improving security

Active Publication Date: 2016-05-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problem that fake public Wi-Fi will pose a security threat to user terminals, the embodiment of the present invention provides a wireless access point authentication method, device and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless access point authentication method, device and system
  • Wireless access point authentication method, device and system
  • Wireless access point authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0037] For ease of understanding, some technical concepts involved in the embodiments of the present invention are firstly introduced.

[0038] public key and private key

[0039] The public key refers to the public key, which does not need to be kept secret, and the decrypting party can obtain it through various channels; while the private key refers to the key held only by the encrypting party itself, which needs to be kept secret. A public key corresponds to a private key; the public key and the private key together form an asymmetric encryption method. Asymmetric encryption means that the information encrypted with the public key can only be decrypted with the corresponding private key, and the information encrypted with the priva...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless access point authentication method, device and system belonging to the network security field. According to the invention, first information is sent to an authentication server through a wireless access point; a management terminal sends second information to the authentication server; after the authentication server receives the second information, the authentication server carries out identity authentication to hardware information and owner information, when the identity authentication is successful, the wireless access point is added in a trust wireless access point list; the problems that the existing authentication method and authentication server add the counterfeit public Wi-Fi as default trust public Wi-Fi, the data transmitted to the counterfeit public Wi-Fi by the user terminal and the data in the user terminal are in security threat are solved; the identity authentication is carried out to the wireless access point by the authentication server; therefore, only the actual wireless access point can pass through the identity authentication of the authentication server; the data security of the data transmitted by the user terminal and the data in the user terminal is improved.

Description

technical field [0001] The embodiments of the present invention relate to the field of network security, and in particular to a wireless access point authentication method, device and system. Background technique [0002] With the widespread use of user terminals, wireless networks have become an important form for user terminals to access the Internet. A common wireless network is a Wi-Fi (Wireless-Fidelity, wireless fidelity) network. Most of the current commercial places provide public Wi-Fi for users to try for free. [0003] In the prior art, when a user terminal accesses public Wi-Fi, the authentication server must authenticate the user terminal. Only after successful authentication can the public Wi-Fi normally forward the relevant data sent by the user terminal. In the process of authenticating the user terminal by the authentication server, the authentication server is in a default trustworthy state for public Wi-Fi, that is, the authentication server does not nee...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08H04W48/16
CPCH04W12/08H04W48/16
Inventor 朱戈唐文宁杨志伟付火平陈水明徐森圣
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products