Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for realizing hotspot security through authentication server

A technology for authenticating servers and hotspots, used in security devices, wireless communications, electrical components, etc., and can solve problems such as hotspot impersonation

Inactive Publication Date: 2016-10-12
徐美琴
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For this reason, it is necessary to provide a method for implementing hotspot security through an authentication server to solve the problem that existing hotspots are impersonated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing hotspot security through authentication server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to describe in detail the technical content, structural features, achieved goals and effects of the technical solution, the following will be described in detail in conjunction with specific embodiments.

[0033] see figure 1 As shown, this embodiment provides a method for implementing hotspot security through an authentication server, which can be applied to figure 1 In the system 100, it is applied between the client, the hotspot and the authentication server, and the client can be a mobile phone 101 or a notebook client. The hotspot 102 stores a unique first encryption method, which means it is different from other hotspots and can be uniquely associated with the identification information of the hotspot. The authentication server 103 stores the first decryption method corresponding to the first encryption method.

[0034] The method includes the following steps: the hotspot changes the ssid and password at regular intervals; the hotspot encrypts the ssid ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing hotspot security through an authentication server. The method comprises the steps that a client obtains and decrypts to obtain the ssid and password of a hotspot through NFC (Near Field Communication), and the client forbids another application to communicate with the client through a wifi module connected with the client; the client establishes connection with the hotspot through the wifi module connected with the client; the client sends random numbers to the hotspot; and the hotspot carries out encryption operation on the random numbers by employing a first encryption method and then obtains verification information. According to the technical scheme of the method, the uniqueness authentication of the hotspot can be realized, and the condition that an AP (Wireless Access Point) is fished can be avoided.

Description

technical field [0001] The invention relates to the technical field of hotspot security management, in particular to a method for realizing hotspot security through an authentication server. Background technique [0002] AP (Wireless Access Point (Wireless Access Point)), that is, wifi access point. The existing wifi is becoming more and more popular, and everyone is using it. A device that can provide wifi signals is a hotspot. You can use your mobile phone or laptop to search for hotspots and connect. Existing hotspot connections are based on ssid and password. , and generally as long as the hotspot with the same ssid and password appears nearby, it can be connected, which facilitates everyone's connection. For example, the hotspot of the existing bus, the user can connect to the hotspot of the bus when sitting on the bus or around the bus. But there is a problem, if the illegal ssid and password are disguised as the bus wifi, then the user can connect to the illegal hot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/08H04L29/06H04W12/03H04W12/122
CPCH04L63/0846H04L63/0869H04W12/06H04W12/08
Inventor 徐美琴
Owner 徐美琴