Unlock instant, AI-driven research and patent intelligence for your innovation.

Network connection method, network connection device, and terminal

A technology for network connection and wireless network access, applied in security devices, electrical components, wireless communication, etc., can solve problems such as stealing user information, ensure information security, improve user security experience, and avoid connecting to phishing networks Effect

Active Publication Date: 2020-01-10
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, some criminals will use a phishing AP hotspot with the same SSID and connection key as a certain AP hotspot to induce the user's terminal (such as a mobile phone, a tablet, etc.) to automatically connect, thereby stealing user information. Somewhere connected to a public hotspot whose SSID is AAA and connection key is PPP, and automatic connection is set at the same time, after criminals establish a phishing AP hotspot with the same SSID and connection key, the user sets the automatic connection function , when entering the coverage area of ​​the phishing AP hotspot, the user's terminal will immediately connect to the phishing AP hotspot, and then criminals can use related technologies to steal user information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network connection method, network connection device, and terminal
  • Network connection method, network connection device, and terminal
  • Network connection method, network connection device, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to have a clearer understanding of the above objects, features and advantages of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0037] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0038] figure 1 A schematic flowchart of the network connection method according to the first embodiment of the present invention is shown.

[0039] Such as figure 1 As shown, the network connection...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a network connection method, a network connection device and a terminal, wherein the network connection method includes: when a wireless network access point is scanned, judging the SSID, BSSID and connection password of the wireless network access point key is correspondingly stored in the preset security network list; when the judgment result is yes, the preset authentication information corresponding to the wireless network access point is encrypted with the preset encryption key and then sent to the wireless network access point access point; detecting whether the response information of the wireless network access point to the encrypted preset authentication information is received; when detecting that the response information is received, determining whether to use the response information according to the response information The connection key establishes a connection with the wireless network access point. The technical solution can effectively improve the security of automatically connecting to a wireless network, avoid connecting to a phishing network, thereby ensuring the information security of the user and improving the security experience of the user.

Description

technical field [0001] The present invention relates to the technical field of communications, and in particular, to a network connection method, a network connection device and a terminal. Background technique [0002] At present, more and more attention is paid to security issues of AP (Access Point, access point) hotspots (also called WIFI (Wireless Fidelity, wireless network) hotspots). One of the usage scenarios is as follows: the user is accustomed to turning on the automatic connection function in the WIFI settings, and can automatically connect to an AP hotspot with the same SSID (Service Set Identifier, service set identification code) and connection key next time, such as , after connecting to a public AP hotspot of a shopping mall, you can automatically connect to the AP hotspot when you come to the mall again next time, so that you can enjoy the Internet. [0003] However, some criminals will use a phishing AP hotspot with the same SSID and connection key as a c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/08
CPCH04W12/06H04W12/08H04W12/062H04W12/069
Inventor 田永胜
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD