[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN112135253B - Network connection method and device - Google Patents

Network connection method and device Download PDF

Info

Publication number
CN112135253B
CN112135253B CN202011188484.9A CN202011188484A CN112135253B CN 112135253 B CN112135253 B CN 112135253B CN 202011188484 A CN202011188484 A CN 202011188484A CN 112135253 B CN112135253 B CN 112135253B
Authority
CN
China
Prior art keywords
wlan
user terminal
password
network connection
private ssid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011188484.9A
Other languages
Chinese (zh)
Other versions
CN112135253A (en
Inventor
李家京
赵一言
向磊
张岳
任永安
韩冰
郭丙峰
王珏
王强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
China Information Technology Designing and Consulting Institute Co Ltd
Beijing Telecom Planning and Designing Institute Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
China Information Technology Designing and Consulting Institute Co Ltd
Beijing Telecom Planning and Designing Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd, China Information Technology Designing and Consulting Institute Co Ltd, Beijing Telecom Planning and Designing Institute Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202011188484.9A priority Critical patent/CN112135253B/en
Publication of CN112135253A publication Critical patent/CN112135253A/en
Application granted granted Critical
Publication of CN112135253B publication Critical patent/CN112135253B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a network connection method and a network connection device, relates to the technical field of communication, and aims to improve the internet access security of a user under the condition of ensuring the resource consumption of WLAN equipment. The method comprises the following steps: configuring a private SSID and a password of a user terminal by a software layer of the WLAN equipment; under the condition that the user terminal moves to the coverage of the WLAN equipment, a software layer of the WLAN equipment sends a private SSID and a password of the user terminal to a hardware layer of the WLAN equipment; the hardware layer of the WLAN device establishes a network connection with the user terminal using the private SSID and password of the user terminal. The invention is suitable for the process of connecting the user terminal with the WLAN equipment.

Description

Network connection method and device
Technical Field
The present application relates to the field of communications, and in particular, to a network connection method and apparatus
Background
In recent years, with the popularization of the internet, various places such as companies, hotels, movie theaters, restaurants and the like are provided with free Wireless Fidelity (WIFI), and when a convenient internet access is provided for users, a great deal of users log in the same WIFI by using the same Service Set Identifier (SSID) and password, great potential safety hazards are brought.
In the prior art, a static SSID and password distribution mode is adopted to isolate information of an encryption channel. Since SSIDs and encryption channels thereof of a router, a Wireless Local Area Network (WLAN) device, a home gateway, a photo cat, and the like are supported by a hardware chip of the WLAN device, and generation of the SSIDs and passwords thereof and establishment of the encryption channels require a large amount of consumption of processing capacity of the hardware chip of the WLAN device, the above devices have limitations on the number of SSIDs generated. How to improve the internet access security of the user under the condition of ensuring the hardware chip resource consumption of the WLAN equipment is still a problem to be solved.
Disclosure of Invention
Embodiments of the present invention provide a network connection method, which can improve the completeness of user access to a network while ensuring resource consumption of a hardware chip of a WLAN device
In order to achieve the above purpose, the embodiment of the invention adopts the following technical scheme:
in a first aspect, the present application provides a network connection method, including: configuring a private SSID and a password of a user terminal by a software layer of the WLAN equipment; in the case that the user terminal moves into the coverage area of the WLAN device, the software layer of the WLAN device sends the private SSID and the password of the user terminal to the hardware layer of the WLAN device; and the hardware layer of the WLAN equipment establishes network connection with the user terminal by using the private SSID and the password of the user terminal.
Compared with the prior art, the method for statically allocating the SSID and the password by the WLAN management system isolates the information of the encryption channel, namely the WLAN management system sends the SSID and the password of one user terminal to all WLAN devices accessing the WLAN management system. Since the WLAN device has limitations on generating the SSID, as the WLAN device receives the SSID and password of the user terminal increases, the processing capability of the hardware chip of the WLAN device may decrease. In the method, the encryption channel is isolated by dynamically allocating the SSID and the password, the private SSID and the password of the user terminal are configured by the software layer of the WLAN device, and the private SSID and the password of the user terminal are sent to the hardware layer by the software layer of the WLAN device under the condition that the user terminal moves to the coverage area of the WLAN device. That is, in the case where the user terminal does not move into the coverage of the WLAN device, the private SSID and password of the user terminal are configured in the software layer of the WLAN device. The private SSID and the password of the user terminal configured by the software layer of the WLAN device are only displayed when the user terminal searches and are not in network connection with the user terminal, so the private SSID and the password of the user terminal configured by the software layer of the WLAN device do not occupy the resources of the WLAN device.
In a second aspect, a network connection device is provided, which includes: and a processing unit. The processing unit is used for indicating a software layer of the WLAN equipment to configure the private SSID and the password of the user terminal; the processing unit is further configured to instruct a software layer of the WLAN device to send a private SSID and a password of the user terminal to a hardware layer of the WLAN device when the user terminal moves into a coverage area of the WLAN device; the processing unit is further configured to instruct a hardware layer of the WLAN device to establish a network connection with the user terminal by using the private SSID and the password of the user terminal.
In a third aspect, a network connection apparatus is provided that includes a memory and a processor. The memory is used for storing computer execution instructions, and the processor is connected with the memory through a bus. When the network connection device is running, the processor executes the computer execution instructions stored in the memory to make the network connection device execute the network connection method according to the first aspect.
The network connection device may be a network device, or may be a part of a device in the network device, for example, a system on chip in the network device. The system on chip is configured to support the network device to implement the functions involved in the first aspect and any one of the possible implementations thereof, for example, to receive, determine, and offload data and/or information involved in the network connection method. The chip system includes a chip and may also include other discrete devices or circuit structures.
In a fourth aspect, a computer-readable storage medium is provided, which includes computer-executable instructions, which, when executed on a computer, cause the computer to perform the network connection method of the first aspect.
In a fifth aspect, a computer program product is provided, which comprises computer instructions that, when run on a computer, cause the computer to perform the network connection method as described in the first aspect and its various possible implementations.
It should be noted that all or part of the above computer instructions may be stored on the first computer readable storage medium. The first computer readable storage medium may be packaged with the processor of the network connection device, or may be packaged separately from the processor of the network connection device, which is not limited in this application.
For the description of the second, third, fourth and fifth aspects of the present invention, reference may be made to the detailed description of the first aspect; in addition, for the beneficial effects described in the second aspect, the third aspect, the fourth aspect and the fifth aspect, reference may be made to beneficial effect analysis of the first aspect, and details are not repeated here.
In the present application, the names of the network connection devices mentioned above do not limit the devices or functional modules themselves, and in actual implementation, the devices or functional modules may appear by other names. Insofar as the functions of the respective devices or functional blocks are similar to those of the present invention, they are within the scope of the claims of the present invention and their equivalents.
These and other aspects of the invention will be more readily apparent from the following description.
Drawings
Fig. 1 is a schematic structural diagram of a communication network according to an embodiment of the present application;
fig. 2 is a flowchart of a network connection method according to an embodiment of the present application;
fig. 3 is a flowchart of a network connection method according to an embodiment of the present application;
fig. 4 is a flowchart of a network connection method according to an embodiment of the present application;
fig. 5 is a flowchart of a network connection method according to an embodiment of the present application;
fig. 6 is a flowchart of a network connection method according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a network connection device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that in the embodiments of the present application, words such as "exemplary" or "for example" are used to indicate examples, illustrations or explanations. Any embodiment or design described herein as "exemplary" or "e.g.," is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
For the convenience of clearly describing the technical solutions of the embodiments of the present application, in the embodiments of the present application, the terms "first", "second", and the like are used to distinguish the same items or similar items with basically the same functions and actions, and those skilled in the art can understand that the terms "first", "second", and the like do not limit the quantity and execution order.
As shown in fig. 1, the present application provides a communication network 100 comprising a plurality of user terminals 10, at least one WLAN device 20, and a WLAN management apparatus 30.
The WLAN management apparatus 30 is used for provisioning and management of a private SSID encryption link of the user terminal 10, and also for association management of the WLAN device 20. One WLAN management apparatus 30 manages one or more WLAN devices 20, and these WLAN devices 20 may be located in the same geographical area or in different geographical areas. The WLAN management apparatus 30 assigns different identities to different WLAN devices 20, and the WLAN management apparatus 30 may determine different WLANs 20 according to the different identities.
Wherein the identification of the WLAN device 20 may be shown in the form of a number or a two-dimensional code.
The WLAN device 20 includes a software layer and a hardware layer, and receives information of the WLAN management apparatus. The WLAN device 20 is used to establish a network connection with the user terminal 10. Each WLAN device 20 may also correspond to multiple system numbers, i.e., WLAN device 20 is in a many-to-many relationship with system numbers.
The WLAN device 20 may be a Wireless Access Point (AP)/Access Controller (AC), an independent router device, a passive optical network PON device having a WLAN function, a router device having a WLAN function, and the like, which is not limited in this application.
The user terminal 10 may be: user terminals, access terminals, terminal units, terminal stations, mobile stations, remote terminals, mobile devices, wireless communication devices, vehicular user terminals, terminal agents or terminal devices, and the like. Optionally, the terminal may be various handheld devices, vehicle-mounted devices, wearable devices, and computers with communication functions, which is not limited in this embodiment of the present invention. For example, the handheld device may be a smartphone. The in-vehicle device may be an in-vehicle navigation system. The wearable device may be a smart bracelet. The computer may be a Personal Digital Assistant (PDA) computer, a tablet computer, and a laptop computer.
Currently, with the development of network technology, the demand of users on the network is higher and higher. The wireless access network is limited by the wireless access flow of the user terminal, and when the user is in a public place, the user is more prone to access a free WLAN in the public place to perform network service.
However, the current WLAN has the following problems:
1. public WLAN security issues
Because the security of the current public WLAN is poor, after the user terminals access the public WLAN, a large number of user terminals use the same SSID, the information transmitted among the user terminals is transparent, and the network service information performed by the user terminals is easy to be acquired by others. For example, information of a webpage browsed by a user, an account password input by the user in the webpage or an APP, user private information stored in a user terminal, and the like are easily stolen by a thief, which brings great loss to the user.
2. Private WLAN security issues
In some scenarios with high network security, a user may use a dedicated device to encrypt information, but this method requires a dedicated device to be configured and maintained by a special person, and the hardware cost and the labor cost are high.
3. Information is difficult to trace to source
In a public WLAN, a large number of user terminals all use the IP address of the public network of the network device providing the WLAN service, and it is difficult to locate a user terminal that issues an unsolicited message using the public WLAN.
For this purpose, a method is proposed, in a WLAN management system, for each ue to assign a corresponding SSID and a key, and for each ue to transmit data using an independent SSID encryption channel and encrypt the data according to the corresponding key.
The method can solve the problems of the WLAN, but the method needs the WLAN equipment to keep a large number of SSID connections to provide network communication capability for the user terminal, and the WLAN equipment generates the SSID and the corresponding password, and needs to consume a large number of hardware chip resources of the WLAN equipment to maintain the SSID encryption channel. Thus, current WLAN devices typically limit the maximum number of SSID connections. For example: an enterprise WLAN device (AP) limits 32 SSIDs, a home gateway, a light cat, etc. limits 4 SSIDs, etc. In a larger scenario environment, a user needs to roam among multiple APs to have a better user experience
When a ue is in a large application scenario, the ue needs to roam among multiple WLAN devices and access the network through different WLAN devices. At this time, a plurality of WLAN devices need to maintain the SSID channels for the user terminal, which increases the resource consumption of the WLAN devices and reduces the number of user terminals accessible to the WLAN devices.
In order to solve the foregoing technical problem, an embodiment of the present application provides a network connection method, where a WLAN device configures a private SSID and a password of each user terminal through a software layer, and when the user terminal moves to a coverage area of the WLAN device, the software layer of the WLAN device sends the private SSID and the password of the user terminal to a hardware layer of the WLAN device, and the hardware layer of the WLAN device establishes a network connection with the user terminal by using the private SSID and the password of the user terminal.
Based on the technical scheme, the WLAN equipment configures the private SSID and the password of each user terminal through the software layer, so that the resource consumption of a hardware chip of the WLAN equipment can be greatly reduced. The software layer of the WLAN device sends the private SSID and the password to the hardware layer of the WLAN device under the condition that the user terminal moves to the coverage area of the WLAN device, and the hardware layer of the WLAN device establishes network connection with the user terminal by using the private SSID and the password of the user terminal, so that the WLAN device does not need to maintain the SSID of the user terminal when the user terminal does not move to the coverage area of the WLAN device. Thereby further reducing the resource consumption of the hardware chip of the WLAN device.
As shown in fig. 2, an embodiment of the present application provides a network connection method, which is applied to the communication network shown in fig. 1. The method comprises the following steps:
s201, configuring private SSID and password of the user terminal by a software layer of the WLAN device.
The software layer of the WLAN device comprises an SSID virtual software system or an SSID virtual plug-in. The private SSID and the password of the user terminal are both generated by the user terminal according to the instruction of the user.
It should be noted that the private SSID may be discovered when the user terminal searches for a connectable network.
In a possible implementation manner, the private SSID and password of the user terminal are based on the private SSID and password allocated by the WLAN management apparatus to the user terminal when the terminal registers with the WLAN management apparatus. The private SSID and the password are in one-to-one correspondence, and the user terminal can be accessed into the WLAN equipment according to the private SSID and the password and is connected with the WLAN equipment through a network.
It should be noted that the software layer of the WLAN device may be disposed in the WLAN device, or disposed in the WLAN management apparatus, or disposed in other devices, which is not limited in this application.
S202, under the condition that the user terminal moves to the coverage area of the WLAN device, the software layer of the WLAN device sends the private SSID and the password of the user terminal to the hardware layer of the WLAN device.
Wherein, the hardware layer of the WLAN device may be a connection chip of the WLAN device.
In one possible implementation manner, the user terminal sends a probe request to WLAN devices around the user terminal, where the probe request is used to obtain wireless network information of the WLAN devices. Accordingly, the WLAN device receives and responds to the probe request of the user terminal. And the user terminal determines the signal strength of the WLAN equipment according to the received WLAN equipment response information. If the signal strength of the WLAN device is greater than or equal to the first preset threshold, the user terminal sends indication information to the WLAN management apparatus, so as to indicate that the WLAN device meets the access condition. The WLAN management apparatus instructs the WLAN device that the software layer of the WLAN device sends the private SSID and password of the user terminal to the hardware layer of the WLAN device.
It should be noted that, when the user terminal determines that the signal strength of the WLAN device is smaller than the first preset threshold, the user terminal may not normally communicate with the WLAN device, or the communication quality between the user terminal and the WLAN device is poor.
S203, the hardware layer of the WLAN equipment uses the private SSID and the password of the user terminal to establish network connection with the user terminal.
According to one possible implementation mode, a user terminal obtains a password to be authenticated of a user, encrypts the password to be authenticated by using an initial secret key to obtain a data frame, and sends the data frame to WLAN equipment. The WLAN equipment searches for the initial key of the corresponding mobile terminal through the MAC address of the data frame, and decrypts the data frame by using the initial key to obtain the authentication password. And comparing whether the authentication password is consistent with the password of the user terminal used by the hardware layer of the WLAN equipment. And if the authentication password is consistent with the password of the user terminal used by the hardware layer of the WLAN equipment, establishing network connection between the hardware layer of the WLAN equipment and the user terminal. If the authentication password is inconsistent with the password of the user terminal used by the hardware layer of the WLAN equipment, the hardware layer of the WLAN equipment and the user terminal do not establish network connection.
Optionally, the user terminal and the WLAN device may perform access network authentication in a bidirectional authentication manner.
It should be noted that, the user terminal and the WLAN device may also perform network access authentication in a bidirectional authentication manner, so as to improve network security.
Based on the technical scheme, the WLAN equipment configures the private SSID and the password of each user terminal through a software layer, so that the resource consumption of a hardware chip of the WLAN equipment can be greatly reduced. The software layer of the WLAN device sends the private SSID and the password to the hardware layer of the WLAN device under the condition that the user terminal moves to the coverage area of the WLAN device, and the hardware layer of the WLAN device establishes network connection with the user terminal by using the private SSID and the password of the user terminal, so that the WLAN device does not need to maintain the SSID of the user terminal when the user terminal does not move to the coverage area of the WLAN device. Thereby further reducing the resource consumption of the hardware chip of the WLAN device.
In a possible implementation manner, referring to fig. 2, as shown in fig. 3, before S203, the network connection method provided in the embodiment of the present application further includes the following steps S301 to S303, which are described in detail below:
s301, the user terminal logs in the WLAN management system.
According to a possible implementation mode, a user logs in a WLAN management system through an APP and an APP PC terminal applet on a user terminal.
Optionally, the APP PC terminal may be a WeChat PC terminal or a QQ PC terminal.
In another possible implementation manner, the user scans the two-dimensional code of the WLAN management system through the user terminal software to log in the WLAN management system.
The two-dimensional code of the WLAN management system is used for linking the WLAN management system.
It should be noted that, in order to improve the security of the WLAN management system, the user logs in the WLAN management system through user information authentication.
According to a possible implementation mode, a user fills in personal identity real-name information on a user terminal and submits the personal identity real-name information to a WLAN management system for real-name login and verification.
In another possible implementation manner, under the condition of obtaining user authorization, the APP user terminal directly extracts real-name information of the user and submits the information to the WLAN management system for real-name login and authentication.
For example, since the user a has already passed the real-name authentication on the WeChat, the WeChat client may directly extract the information of the user a authenticated on the WeChat under the authorization of the user a, and submit the information to the WLAN management system for the real-name login and authentication. Therefore, the real-name information of the user can be quickly and accurately acquired, and the user experience is improved.
S302, the user terminal sends the private SSID and the password of the user terminal to the WLAN management system.
After the user terminal logs in the WLAN management system, a private SSID and password setting interface of the WLAN management system is displayed in a display interface of the user terminal, and after receiving the private SSID and the password set in the interface by the user, the user terminal sends the private SSID and the password of the user terminal to the WLAN management system.
In a possible implementation manner, after the private SSID and the password are set, the user terminal needs to input the set private SSID and password again for verification, so as to ensure the correctness of the set password.
Illustratively, the user sets a private SSID as AABBCCDD and a password as abcd in the WLAN management system. And the user needs to input the preset private SSID and the password again, and if the private SSID input again by the user is AABBCCDD and the password is abcd, the user completes the setting of the private SSID and the password. If the user re-inputs the preset private SSID which is not AABBCCDD or the password which is not abcd, the WLAN management system can remind the user that the private SSID and the password which are set by the user terminal fail to be set.
S303, the WLAN management system sends a private SSID configuration message to the software layer of the WLAN device. Accordingly, the software layer of the WLAN device receives the private SSID and password of the user terminal.
Wherein the private SSID configuration message includes a private SSID and a password of the user terminal. The WLAN management system stores therein an ID of the WLAN device. The WLAN device accesses all WLAN devices of the WLAN management system.
In one possible implementation manner, the WLAN management system obtains IDs of all WLAN devices accessing the WLAN management system, and sends a private SSID and a password of the user terminal to the WLAN device according to the IDs of the WLAN devices.
It is understood that the ID of each WLAN terminal accessing the WLAN management system corresponds to a WLAN device address. The WLAN management system sends the private SSID and the password of the user terminal to the WLAN device through the address of the WLAN device.
In one possible implementation, the application software of the WLAN device sends the private SSID and password of the user terminal to the software layer of the WLAN device. The application software of the WLAN device sends the first information to the WLAN management system and to the user terminal. The first information comprises that the WLAN device successfully sends the private SSID and the password of the user terminal to the software layer of the WLAN device or that the WLAN device fails to send the private SSID and the password of the user terminal to the software layer of the WLAN device.
It should be noted that, since the application software of the WLAN device sends the first information to the WLAN management system and the user terminal, the user can know whether the software layer of the WLAN device receives the private SSID and the password of the user terminal. Thereby ensuring that the user can normally access the network.
In the above, before configuring the private SSID and the password of the user terminal in the software layer of the WLAN device, the user terminal registers in the WLAN management apparatus to generate the private SSID and the password of the user terminal; and a procedure in which the WLAN management apparatus transmits the private SSID and the password to the software layer of the WLAN device after determining the private SSID and the password of the user terminal.
Based on this, the software layer of the WLAN device can accurately determine the unique private SSID and password corresponding to the user terminal, and configure the private SSID and password in the software layer.
With reference to fig. 3, in a possible implementation manner, after the user terminal completes registration in the WLAN management apparatus, a scenario that the user terminal accesses the WLAN device includes the following scenario 1 that the user terminal accesses the WLAN device for the first time; and scenario 2, the user terminal is handed over from one WLAN device to another WLAN device, which are described below:
scene 1, a user terminal accesses a WLAN device for the first time.
In scenario 1, with reference to fig. 3, as shown in fig. 4, the accessing of the user terminal to the WLAN device includes the following steps S304-S307, which are described in detail below:
s304, the WLAN management apparatus transmits the first indication information to the user terminal. Accordingly, the user terminal receives the first indication information from the WLAN management device.
The first indication information is used for indicating the user terminal to measure the signal strength of each WLAN device.
S305, the user terminal measures the signal intensity of each WLAN device and determines the target WLAN device with the highest signal intensity.
S306, the user terminal sends the device identification of the target WLAN device to the WLAN management device.
S307, the WLAN management apparatus sends the second indication information to the software layer of the target WLAN device.
The second indication information is used for indicating the software layer of the target WLAN device to send the private SSID and the password of the user terminal to the hardware layer of the target WLAN device.
After S307, the WLAN device sequentially performs the above S201 to S203. Such that the target WLAN device establishes a network connection with the user device.
Based on the technical scheme, when the user terminal accesses the WLAN network for the first time, the user terminal can access the WLAN network through the WLAN equipment with the best signal intensity.
Scenario 2, the user terminal is handed over from one WLAN device to another WLAN device.
In this scenario, referring to fig. 3, the step of switching the WLAN device by the user terminal as shown in fig. 5 includes the following steps S308-S309, which are described in detail below:
s308, the user terminal measures the signal intensity of each WLAN device covering the area of the terminal device in real time.
S309, when the signal intensity of the second WLAN equipment is larger than that of the first WLAN equipment, the user terminal sends a connection establishment request to the second WLAN equipment.
The first WLAN equipment is WLAN equipment which is accessed by the user terminal currently. The second WLAN device is a WLAN device that covers the user terminal after the user terminal moves.
After S309, the WLAN device sequentially performs S201 to S203 described above. Such that the second WLAN device establishes a network connection with the user device.
Based on the technical scheme, the user terminal always keeps establishing connection with the WLAN equipment with the best signal intensity in the moving process, and the network quality of the user terminal is improved.
Based on the above scenario 1 and scenario 2, the user terminal selects different ways to establish connection with the WLAN device in different scenarios, so that the applicability of the embodiment of the present application is improved.
With reference to fig. 2 and as shown in fig. 6, after S203, the network connection method provided in the embodiment of the present application further includes: S204-S206.
And S204, determining the deletion message by the WLAN management system.
Wherein the deletion message is used to instruct the WLAN device to delete the private SSID and password of the user terminal.
In one possible implementation, the WLAN management system may determine the deletion message by the following two ways:
mode 1, the WLAN management system generates a delete message.
Specifically, the WLAN management system detects the operation condition of the accessed WLAN device in real time, and if the WLAN management system finds that no traffic occurs in the user terminal in a first time period, and the first time period is longer than a first preset time period, the WLAN management system generates a deletion message.
Mode 2, the user terminal sends a delete message to the WLAN management system.
In particular, after the terminal device is handed over from the first WLAN device to the second WLAN device, the first WLAN device has not been required to continue to save the private SSID and password of the user terminal. At this time, the first WLAN device may reduce hardware chip resources of the first WLAN device by deleting the private SSID and password of the user terminal.
Thus, the user device sends a delete message to the WLAN management system after the terminal device is handed over from the first WLAN device to the second WLAN device to cause the first WLAN device to delete the private SSID and password of the user terminal.
S205, the WLAN management system sends a deletion message to the first WLAN device. Accordingly, the first WLAN device receives a deletion message from the WLAN management system.
S206, the first WLAN equipment deletes the private SSID and the password of the user terminal.
In one possible implementation manner, the WLAN device sends third information to the WLAN management system, where the third information is used to characterize whether the WLAN device successfully deletes the private SSID and the password of the user terminal.
Optionally, the WLAN management system sends the third information to the user terminal.
In a possible implementation manner, for a WLAN device that a user terminal does not access, a hardware layer of the WLAN device generates a virtual SSID, where the virtual SSID corresponds to a user terminal, and is used to indicate that the user terminal has accessed to a WLAN network to which the WLAN device belongs but has not accessed to the WLAN device. After the user terminal accesses the WLAN equipment, the hardware layer of the WLAN equipment replaces the virtual SSID with a private SSID and a secret key sent by the software layer of the user terminal, and establishes connection with the user terminal according to the private SSID and the secret key.
The virtual SSID is only used for indicating that the user terminal is accessed into the WLAN network to which the WLAN device belongs, and is not used for real connection. The virtual SSID may be implemented by a software layer of the WLAN device or a hardware layer of the WLAN device, which is not limited in this application.
The virtual SSID only occupies a small amount of resources of a WLAN device hardware chip, and the virtual SSIDs of all the user terminals accessing the WLAN network can jointly occupy one channel for SSID display, so that network resources in the WLAN network are saved.
Therefore, the WLAN device can determine that the user terminal has accessed the WLAN network through the virtual SSID, and simultaneously, hardware resources of the WLAN device occupied by the SSID of the user terminal and network resources of the WLAN network are reduced.
The scheme provided by the embodiment of the application is mainly introduced from the perspective of a method. To implement the above functions, it includes hardware structures and/or software modules for performing the respective functions. Those of skill in the art will readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiment of the present application, the network connection device may be divided into functional modules according to the above method examples, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. Optionally, the division of the modules in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
Fig. 7 is a schematic structural diagram of a network connection device 70 according to an embodiment of the present disclosure. The network connection device 70 is used to reduce resource consumption of a hardware chip of the WLAN device and improve internet access security of the user. For example, for performing the network connection method shown in fig. 2 to 6. The network connection device 70 includes: a processing unit 701.
The processing unit 701 is configured to instruct a software layer of the WLAN device to configure a private SSID and a password of the user terminal.
The processing unit 701 is further configured to instruct a software layer of the WLAN device to send a private SSID and a password of the user terminal to a hardware layer of the WLAN device when the user terminal moves into a coverage area of the WLAN device.
The processing unit 701 is further configured to instruct a hardware layer of the WLAN device to establish a network connection with the user terminal using the private SSID and the password of the user terminal.
Optionally, the network connection device further includes: a communication unit 702. A communication unit 702, configured to receive a private SSID configuration message sent by the WLAN management system, where the private SSID configuration message includes a private SSID and a password of the user terminal.
Optionally, the communication unit 702 is further configured to: and receiving a notification message sent by the WLAN management system, wherein the notification message is used for indicating the WLAN equipment to establish network connection with the user terminal.
Optionally, the processing unit 701 is further configured to delete the private SSID and the password of the user terminal after the WLAN device disconnects from the user terminal.
And (4) optional. The communication unit 702 is further configured to receive a deletion message sent by the WLAN management system, where the deletion message is used to instruct the software layer of the WLAN device to delete the private SSID and the password of the user terminal;
the processing unit 701 is further configured to delete the private SSID and the password of the user terminal according to the deletion message.
Embodiments of the present application further provide a computer-readable storage medium, which includes computer-executable instructions. When the computer executes the instructions to run on the computer, the computer is enabled to execute the steps executed by the network connection device in the network connection method provided by the embodiment.
The embodiments of the present application further provide a computer program product, where the computer program product is directly loadable into a memory and contains software codes, and the computer program product is loaded and executed by a computer to implement the steps executed by the network connection device in the network connection method provided in the foregoing embodiments.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented using a software program, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The processes or functions according to the embodiments of the present application are generated in whole or in part when the computer-executable instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). Computer-readable storage media can be any available media that can be accessed by a computer or can comprise one or more data storage devices, such as servers, data centers, and the like, that can be integrated with the media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), among others.
Through the above description of the embodiments, it is clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the above described functions.
In the several embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules or units is only one logical function division, and there may be other division ways in actual implementation. For example, various elements or components may be combined or may be integrated into another device, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form. Units described as separate parts may or may not be physically separate, and parts displayed as units may be one physical unit or a plurality of physical units, may be located in one place, or may be distributed to a plurality of different places. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partially contributed to by the prior art, or all or part of the technical solutions may be embodied in the form of a software product, where the software product is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (7)

1. A method of network connectivity, the method comprising:
configuring a private SSID and a password of a user terminal by a software layer of the WLAN equipment;
in the case that the user terminal moves into the coverage of the WLAN device, the software layer of the WLAN device sends the private SSID and the password of the user terminal to the hardware layer of the WLAN device; the user terminal is configured to send a probe request to the WLAN device, where the probe request is used to obtain wireless network information of the WLAN device; the WLAN equipment receives and responds to a detection request of the user terminal, so that the user terminal determines the signal intensity of the WLAN equipment according to the received response information of the WLAN equipment; if the indication information of the user terminal is received, the WLAN equipment determines that the user terminal moves to the coverage area of the WLAN equipment; the indication information is sent by the user terminal under the condition that the signal intensity of the WLAN equipment is greater than or equal to a first preset threshold;
the hardware layer of the WLAN equipment establishes network connection with the user terminal by using the private SSID and the password of the user terminal;
before the software layer of the WLAN device configures the private SSID and password of the user terminal, the method further comprises:
the WLAN equipment receives a private SSID configuration message sent by a WLAN management system, wherein the private SSID configuration message comprises a private SSID and a password of the user terminal;
after the WLAN device is disconnected from the user terminal through the network, the hardware layer of the WLAN device deletes the private SSID and the password of the user terminal.
2. The network connection method of claim 1, wherein after the software layer of the WLAN device configures the private SSID and password of the user terminal, the method further comprises:
and the WLAN equipment receives a notification message sent by a WLAN management system, wherein the notification message is used for indicating the WLAN equipment to establish network connection with the user terminal.
3. The network connection method according to any one of claims 1-2, wherein the method further comprises:
the WLAN equipment receives a deletion message sent by the WLAN management system, wherein the deletion message is used for indicating a software layer of the WLAN equipment to delete the private SSID and the password of the user terminal;
and the WLAN equipment deletes the private SSID and the password of the user terminal according to the deletion message.
4. A network connection apparatus, the apparatus comprising: a processing unit;
the processing unit is used for indicating a software layer of the WLAN equipment to configure the private SSID and the password of the user terminal;
the processing unit is further configured to instruct a software layer of the WLAN device to send a private SSID and a password of the user terminal to a hardware layer of the WLAN device when the user terminal moves into a coverage area of the WLAN device; the user terminal is configured to send a probe request to the WLAN device, where the probe request is used to obtain wireless network information of the WLAN device; the WLAN equipment receives and responds to a detection request of the user terminal, so that the user terminal determines the signal intensity of the WLAN equipment according to the received response information of the WLAN equipment; if the indication information of the user terminal is received, the WLAN equipment determines that the user terminal moves to the coverage area of the WLAN equipment; the indication information is sent by the user terminal under the condition that the signal intensity of the WLAN equipment is greater than or equal to a first preset threshold;
the processing unit is further configured to instruct a hardware layer of the WLAN device to establish a network connection with the user terminal using the private SSID and the password of the user terminal; after the WLAN equipment is disconnected from the network of the user terminal, deleting the private SSID and the password of the user terminal by a hardware layer of the WLAN equipment;
the network connection device further includes: a communication unit;
the communication unit is configured to receive a private SSID configuration message sent by a WLAN management system, where the private SSID configuration message includes a private SSID and a password of the user terminal.
5. The network connection apparatus according to claim 4, wherein the communication unit is further configured to:
and receiving a notification message sent by a WLAN management system, wherein the notification message is used for indicating the WLAN equipment to establish network connection with the user terminal.
6. A network connection device comprising a memory and a processor; the memory is used for storing computer execution instructions, and the processor is connected with the memory through a bus;
the processor executes the computer-executable instructions stored by the memory when the network connection device is running to cause the network connection device to perform the network connection method of any of claims 1-3.
7. A computer-readable storage medium, comprising computer-executable instructions that, when executed on a computer, cause the computer to perform the network connection method of any of claims 1-3.
CN202011188484.9A 2020-10-30 2020-10-30 Network connection method and device Active CN112135253B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011188484.9A CN112135253B (en) 2020-10-30 2020-10-30 Network connection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011188484.9A CN112135253B (en) 2020-10-30 2020-10-30 Network connection method and device

Publications (2)

Publication Number Publication Date
CN112135253A CN112135253A (en) 2020-12-25
CN112135253B true CN112135253B (en) 2023-03-17

Family

ID=73851985

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011188484.9A Active CN112135253B (en) 2020-10-30 2020-10-30 Network connection method and device

Country Status (1)

Country Link
CN (1) CN112135253B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113596943B (en) * 2021-08-11 2022-08-26 中国联合网络通信集团有限公司 Wireless network information storage method and terminal

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104113934A (en) * 2014-07-25 2014-10-22 北京奇虎科技有限公司 Router accessing method for communication equipment and accessing system
CN111314991A (en) * 2020-02-11 2020-06-19 中国联合网络通信集团有限公司 Network access control method, device and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104348686B (en) * 2013-08-06 2018-06-05 华为终端有限公司 Interconnected method and device between a kind of terminal device and gateway device
CN107567017B (en) * 2016-06-30 2021-07-09 华为技术有限公司 Wireless connection system, device and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104113934A (en) * 2014-07-25 2014-10-22 北京奇虎科技有限公司 Router accessing method for communication equipment and accessing system
CN111314991A (en) * 2020-02-11 2020-06-19 中国联合网络通信集团有限公司 Network access control method, device and system

Also Published As

Publication number Publication date
CN112135253A (en) 2020-12-25

Similar Documents

Publication Publication Date Title
CN111669276B (en) Network verification method, device and system
US9516579B1 (en) Social bandwidth and connectivity sharing
CN106921963A (en) A kind of smart machine accesses the method and device of WLAN
CA2777098C (en) Using a first network to control access to a second network
CN106851632A (en) A kind of smart machine accesses the method and device of WLAN
CN104202308A (en) Implementation method of safe batch configuration of Wi-Fi Internet of Things system
CN111182546B (en) Method, equipment and system for accessing wireless network
CN114071452B (en) Method and device for acquiring user subscription data
CN113286332B (en) Information transmission method and equipment
TWI699107B (en) Group establishment method for multi-login authentication user and switching device thereof
KR20160099396A (en) Using method for communication service and electronic device supporting the same
CN112367711A (en) Resource allocation method, device and system for network slices
WO2020029754A1 (en) Signing information configuration method and communication device
WO2018045983A1 (en) Information processing method and device, and network system
CN105491093A (en) Terminal authentication method, network access methods, server, wireless access point and terminal
CN112512045A (en) Communication system, method and device
WO2022002244A1 (en) Online subscription method, apparatus and system
JP2023527193A (en) Service Acquisition Method, Device, Communication Device and Readable Storage Medium
CN112135253B (en) Network connection method and device
US20230137283A1 (en) Systems and methods to optimize registration and session establishment in a wireless network
US20090037979A1 (en) Method and System for Recovering Authentication in a Network
KR20140113233A (en) Mobile station apparatus having concurrent multiple connections
CN102891900B (en) A kind of method, apparatus and system of the domain name mapping in flow unloading
CN111756680A (en) Data authentication method and device
KR101940722B1 (en) Method for providing communication security for user mobile in open wifi zone

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant