CN112616146A - Method for establishing WiFi connection between terminal and wireless access point - Google Patents
Method for establishing WiFi connection between terminal and wireless access point Download PDFInfo
- Publication number
- CN112616146A CN112616146A CN202011406772.7A CN202011406772A CN112616146A CN 112616146 A CN112616146 A CN 112616146A CN 202011406772 A CN202011406772 A CN 202011406772A CN 112616146 A CN112616146 A CN 112616146A
- Authority
- CN
- China
- Prior art keywords
- terminal
- access point
- wireless access
- uniquely corresponding
- wifi
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention is applicable to the field of communication, and provides a method for establishing WiFi connection between a terminal and a wireless access point and the wireless access point. The method comprises the following steps: the wireless access point and the terminal respectively calculate a WiFi password uniquely corresponding to the terminal by a pre-agreed algorithm between the terminal and the wireless access point according to a pre-agreed private key between the terminal and the wireless access point and the address uniquely corresponding to the terminal carried in the request information; and after the wireless access point receives the WiFi password uniquely corresponding to the terminal, judging whether the WiFi password uniquely corresponding to the terminal calculated by the wireless access point is the same as the received WiFi password uniquely corresponding to the terminal, and if so, successfully establishing WiFi connection between the terminal and the wireless access point. According to the method and the device, one key can be connected into the WiFi network, a user does not need to input passwords manually, each terminal corresponds to one only WiFi password, and the security of the wireless network is higher.
Description
Technical Field
The invention belongs to the field of communication, and particularly relates to a method for establishing WiFi connection between a terminal and a wireless access point and the wireless access point.
Background
The prior art provides various methods for establishing a WiFi connection between a terminal and a wireless access point. However, the prior art cannot give consideration to both the security of the wireless network and the high efficiency and convenience of the wireless access process, and the more secure the network is, the more complex the wireless encryption method is, the longer the terminal spends in accessing; the more efficient the network access is, the simpler the wireless encryption method is, so that the time the terminal spends accessing is shorter, but the network security is poor.
The most common and most extensive method in the market at present is that a wireless access point is preset with a WiFi password, then the password is informed to a terminal needing to be connected with the WiFi in a certain form, and all terminals can use the password to connect with the wireless access point; however, the password is single, once the password is leaked, a person knowing the password can steal data of other users, so that the security of the wireless network is poor, and the user also needs to have a process of inputting the password, so that the wireless access process is slow.
Disclosure of Invention
The invention aims to provide a method for establishing WiFi connection between a terminal and a wireless access point, which does not need to input passwords manually and has higher security of a wireless network, the terminal and the wireless access point.
In a first aspect, the present invention provides a method for establishing a WiFi connection between a terminal and a wireless access point, where the method includes:
a terminal acquires request information and sends the request information to a wireless access point, the request information is used for requesting to establish WiFi connection with a specified wireless access point, and the request information carries the specified wireless access point and an address uniquely corresponding to the terminal;
the terminal calculates a WiFi password uniquely corresponding to the terminal by a pre-agreed algorithm between the terminal and the wireless access point according to a pre-agreed private key between the terminal and the wireless access point and the address uniquely corresponding to the terminal carried in the request information;
the terminal sends a WiFi password uniquely corresponding to the terminal to a wireless access point for access verification, after the WiFi password uniquely corresponding to the terminal is received by the wireless access point, whether the WiFi password uniquely corresponding to the terminal calculated by the wireless access point is the same as the received WiFi password uniquely corresponding to the terminal is judged, if yes, WiFi connection is successfully established between the terminal and the wireless access point, and the WiFi password uniquely corresponding to the terminal calculated by the wireless access point is calculated by the wireless access point according to a private key agreed in advance between the terminal and the wireless access point and an address uniquely corresponding to the terminal carried in the request information by the wireless access point according to an algorithm agreed in advance between the terminal and the wireless access point.
In a second aspect, the present invention provides a terminal, comprising:
one or more processors;
a memory; and
one or more computer programs, the processor and the memory being connected by a bus, wherein the one or more computer programs are stored in the memory and configured to be executed by the one or more processors, which when executing the computer programs implement the steps of the method of establishing a WiFi connection between a terminal and a wireless access point as described above.
In a third aspect, the present invention provides a method for establishing a WiFi connection between a terminal and a wireless access point, where the method includes:
the method comprises the steps that a wireless access point receives request information sent by a terminal, the wireless access point calculates a WiFi password uniquely corresponding to the terminal according to a private key agreed in advance between the terminal and the wireless access point and the address uniquely corresponding to the terminal carried in the request information by an algorithm agreed in advance between the terminal and the wireless access point, the request information is used for requesting to establish WiFi connection with an appointed wireless access point, and the request information carries the appointed wireless access point and the address uniquely corresponding to the terminal;
after the wireless access point receives the WiFi password which is sent by the terminal and uniquely corresponds to the terminal, whether the WiFi password which is calculated by the wireless access point and uniquely corresponds to the terminal is the same as the received WiFi password which is uniquely corresponding to the terminal is judged, and if the WiFi password is the same, WiFi connection is successfully established between the terminal and the wireless access point; the WiFi password which is sent by the terminal and uniquely corresponds to the terminal is calculated by the terminal according to a private key which is pre-agreed between the terminal and the wireless access point and the address which is carried in the request information and uniquely corresponds to the terminal through an algorithm which is pre-agreed between the terminal and the wireless access point.
Further, after the WiFi connection is successfully established between the terminal and the wireless access point, the method further includes:
and the wireless access point binds the WiFi password which can ensure that the WiFi connection is successfully established between the terminal and the wireless access point with the address uniquely corresponding to the terminal.
In a fourth aspect, the present invention provides a wireless access point, comprising:
one or more processors;
a memory; and
one or more computer programs, the processor and the memory being connected by a bus, wherein the one or more computer programs are stored in the memory and configured to be executed by the one or more processors, which when executing the computer programs implement the steps of the method of establishing a WiFi connection between a terminal and a wireless access point as described above.
In the invention, the wireless access point and the terminal respectively calculate the WiFi password uniquely corresponding to the terminal by the algorithm agreed in advance between the terminal and the wireless access point according to the private key agreed in advance between the terminal and the wireless access point and the address uniquely corresponding to the terminal carried in the request information; and after the wireless access point receives the WiFi password uniquely corresponding to the terminal, judging whether the WiFi password uniquely corresponding to the terminal calculated by the wireless access point is the same as the received WiFi password uniquely corresponding to the terminal, and if so, successfully establishing WiFi connection between the terminal and the wireless access point. Therefore, one key can be connected into the WiFi network, a user does not need to input passwords manually, each terminal corresponds to one unique WiFi password, and the security of the wireless network is high. And because the wireless access point binds the WiFi password which can ensure that the WiFi connection is successfully established between the terminal and the wireless access point with the address which is only corresponding to the terminal. So even if the WiFi password is revealed to other terminals, it cannot be used. The intelligent household Internet of things system has wide application prospect in the intelligent education classroom equipment networking, the industrial special wireless equipment networking, the intelligent household Internet of things and other directions.
Drawings
Fig. 1 is a flowchart of a method for establishing a WiFi connection between a terminal and a wireless access point according to an embodiment of the present application.
Fig. 2 is a block diagram of a specific structure of a terminal according to an embodiment of the present application.
Fig. 3 is a block diagram illustrating a detailed structure of a wireless access point according to an embodiment of the present disclosure.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more clearly apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In order to explain the technical means of the present invention, the following description will be given by way of specific examples.
Please refer to fig. 1, which is a flowchart illustrating a method for establishing a WiFi connection between a terminal and a wireless access point according to an embodiment of the present application. The method for establishing the WiFi connection between the terminal and the wireless access point, provided by the embodiment of the application, comprises the following steps:
s101, a terminal acquires request information and sends the request information to a wireless access point, the request information is used for requesting to establish WiFi connection with a specified wireless access point, and the request information carries the specified wireless access point and an address uniquely corresponding to the terminal.
In an embodiment of the application, the request information is generated by the terminal after the user manually selects a wireless access point to establish a WiFi connection. The request message may be automatically generated after the terminal detects the wireless access point.
The Address uniquely corresponding to the terminal may be a Media Access Control Address (MAC Address) of the terminal or a Serial Number (SN) code of the terminal.
S102, the wireless access point receives the request information, and the wireless access point and the terminal respectively calculate a WiFi password uniquely corresponding to the terminal according to a private key agreed in advance between the terminal and the wireless access point and the address uniquely corresponding to the terminal carried in the request information by an algorithm agreed in advance between the terminal and the wireless access point.
In an embodiment of the present application, the private key may be updated periodically.
In an embodiment of the present application, the pre-agreed algorithm may be PBKDF2 encryption algorithm; alternatively, the predetermined algorithm may be an exclusive or operation of the MD5 algorithm in combination with a predetermined rule, and of course, other self-defined algorithms may also be adopted, which is not limited to the above examples.
The wireless access point and the terminal respectively calculate, according to a private key agreed in advance between the terminal and the wireless access point and the address uniquely corresponding to the terminal carried in the request information, a WiFi password uniquely corresponding to the terminal by an algorithm agreed in advance between the terminal and the wireless access point, which may specifically be:
calculating a 16-byte first MD5 value (Message-Digest Algorithm) of a private key agreed in advance between the terminal and the wireless access point, and calculating a 16-byte second MD5 value of the address uniquely corresponding to the terminal carried in the request information;
repeatedly executing 32 operations from the 7 th byte of the first MD5 value and the 13 th byte of the second MD5 value, wherein each operation respectively and circularly takes one byte of the first MD5 value and the second MD5 value to perform exclusive OR operation, and a 32-byte hexadecimal password is generated;
and converting the 32-byte hexadecimal password into a 64-byte character string, and taking the 64-byte character string as the WiFi password which is uniquely corresponding to the terminal.
Of course, other custom algorithms may be used, and are not limited to the above examples.
S103, the terminal sends the WiFi password uniquely corresponding to the terminal to the wireless access point for access verification.
And S104, after the wireless access point receives the WiFi password uniquely corresponding to the terminal, judging whether the WiFi password uniquely corresponding to the terminal calculated by the wireless access point is the same as the received WiFi password uniquely corresponding to the terminal, and if so, successfully establishing WiFi connection between the terminal and the wireless access point.
In an embodiment of the present application, after S104, the method may further include:
and the wireless access point binds a WiFi password which can enable the terminal and the wireless access point to successfully establish WiFi connection with the address uniquely corresponding to the terminal so as to enable the WiFi password to be invalid for other terminals.
Fig. 2 shows a specific structural block diagram of a terminal provided in an embodiment of the present application, where a terminal 100 includes: one or more processors 101, a memory 102, and one or more computer programs, wherein the processors 101 and the memory 102 are connected by a bus, the one or more computer programs being stored in the memory 102 and configured to be executed by the one or more processors 101, the computer programs when executed by the processors 101 implementing the steps of:
a terminal acquires request information and sends the request information to a wireless access point, the request information is used for requesting to establish WiFi connection with a specified wireless access point, and the request information carries the specified wireless access point and an address uniquely corresponding to the terminal;
the terminal calculates a WiFi password uniquely corresponding to the terminal by a pre-agreed algorithm between the terminal and the wireless access point according to a pre-agreed private key between the terminal and the wireless access point and the address uniquely corresponding to the terminal carried in the request information;
the terminal sends a WiFi password uniquely corresponding to the terminal to a wireless access point for access verification, after the WiFi password uniquely corresponding to the terminal is received by the wireless access point, whether the WiFi password uniquely corresponding to the terminal calculated by the wireless access point is the same as the received WiFi password uniquely corresponding to the terminal is judged, if yes, WiFi connection is successfully established between the terminal and the wireless access point, and the WiFi password uniquely corresponding to the terminal calculated by the wireless access point is calculated by the wireless access point according to a private key agreed in advance between the terminal and the wireless access point and an address uniquely corresponding to the terminal carried in the request information by the wireless access point according to an algorithm agreed in advance between the terminal and the wireless access point.
In an embodiment of the application, the request information is generated by the terminal after the user manually selects a wireless access point for establishing the WiFi connection, or is automatically generated after the terminal detects the wireless access point.
In an embodiment of the present application, the address uniquely corresponding to the terminal is a MAC address of the terminal.
In an embodiment of the application, the private key is updated periodically.
In an embodiment of the present application, the calculating, by the terminal according to a private key agreed in advance between the terminal and the wireless access point and the address uniquely corresponding to the terminal carried in the request information and using an algorithm agreed in advance between the terminal and the wireless access point, a WiFi password uniquely corresponding to the terminal specifically includes:
calculating a 16-byte first MD5 value of a private key agreed in advance between the terminal and the wireless access point, and calculating a 16-byte second MD5 value of the address uniquely corresponding to the terminal carried in the request information;
repeatedly executing 32 operations from the 7 th byte of the first MD5 value and the 13 th byte of the second MD5 value, wherein each operation respectively and circularly takes one byte of the first MD5 value and the second MD5 value to perform exclusive OR operation, and a 32-byte hexadecimal password is generated;
and converting the 32-byte hexadecimal password into a 64-byte character string, and taking the 64-byte character string as the WiFi password which is uniquely corresponding to the terminal.
Fig. 3 is a block diagram illustrating a specific structure of a wireless access point according to an embodiment of the present application, where a wireless access point 200 includes: one or more processors 201, a memory 202, and one or more computer programs, wherein the processors 201 and the memory 202 are connected by a bus, the one or more computer programs being stored in the memory 202 and configured to be executed by the one or more processors 201, the processor 201 implementing the following steps when executing the computer programs:
the method comprises the steps that a wireless access point receives request information sent by a terminal, the wireless access point calculates a WiFi password uniquely corresponding to the terminal according to a private key agreed in advance between the terminal and the wireless access point and the address uniquely corresponding to the terminal carried in the request information by an algorithm agreed in advance between the terminal and the wireless access point, the request information is used for requesting to establish WiFi connection with an appointed wireless access point, and the request information carries the appointed wireless access point and the address uniquely corresponding to the terminal;
after the wireless access point receives the WiFi password which is sent by the terminal and uniquely corresponds to the terminal, whether the WiFi password which is calculated by the wireless access point and uniquely corresponds to the terminal is the same as the received WiFi password which is uniquely corresponding to the terminal is judged, and if the WiFi password is the same, WiFi connection is successfully established between the terminal and the wireless access point; the WiFi password which is sent by the terminal and uniquely corresponds to the terminal is calculated by the terminal according to a private key which is pre-agreed between the terminal and the wireless access point and the address which is carried in the request information and uniquely corresponds to the terminal through an algorithm which is pre-agreed between the terminal and the wireless access point.
In an embodiment of the present application, the calculating, by the wireless access point according to a private key agreed in advance between the terminal and the wireless access point and the address uniquely corresponding to the terminal carried in the request information and by an algorithm agreed in advance between the terminal and the wireless access point, a WiFi password uniquely corresponding to the terminal specifically includes:
calculating a 16-byte first MD5 value (Message-Digest Algorithm) of a private key agreed in advance between the terminal and the wireless access point, and calculating a 16-byte second MD5 value of the address uniquely corresponding to the terminal carried in the request information;
repeatedly executing 32 operations from the 7 th byte of the first MD5 value and the 13 th byte of the second MD5 value, wherein each operation respectively and circularly takes one byte of the first MD5 value and the second MD5 value to perform exclusive OR operation, and a 32-byte hexadecimal password is generated;
and converting the 32-byte hexadecimal password into a 64-byte character string, and taking the 64-byte character string as the WiFi password which is uniquely corresponding to the terminal.
In an embodiment of the present application, after the WiFi connection is successfully established between the terminal and the wireless access point, the method further includes:
and the wireless access point binds the WiFi password which can ensure that the WiFi connection is successfully established between the terminal and the wireless access point with the address uniquely corresponding to the terminal.
In the invention, the wireless access point and the terminal respectively calculate the WiFi password uniquely corresponding to the terminal by the algorithm agreed in advance between the terminal and the wireless access point according to the private key agreed in advance between the terminal and the wireless access point and the address uniquely corresponding to the terminal carried in the request information; and after the wireless access point receives the WiFi password uniquely corresponding to the terminal, judging whether the WiFi password uniquely corresponding to the terminal calculated by the wireless access point is the same as the received WiFi password uniquely corresponding to the terminal, and if so, successfully establishing WiFi connection between the terminal and the wireless access point. Therefore, one key can be connected into the WiFi network, a user does not need to input passwords manually, each terminal corresponds to one unique WiFi password, and the security of the wireless network is high. And because the wireless access point binds the WiFi password which can ensure that the WiFi connection is successfully established between the terminal and the wireless access point with the address which is only corresponding to the terminal. So even if the WiFi password is revealed to other terminals, it cannot be used. The intelligent household Internet of things system has wide application prospect in the intelligent education classroom equipment networking, the industrial special wireless equipment networking, the intelligent household Internet of things and other directions.
It should be understood that the steps in the embodiments of the present application are not necessarily performed in the order indicated by the step numbers. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in various embodiments may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of performing the sub-steps or stages is not necessarily sequential, but may be performed alternately or alternately with other steps or at least some of the sub-steps or stages of other steps.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only show some embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (10)
1. A method for establishing WiFi connection between a terminal and a wireless access point, the method comprising:
a terminal acquires request information and sends the request information to a wireless access point, the request information is used for requesting to establish WiFi connection with a specified wireless access point, and the request information carries the specified wireless access point and an address uniquely corresponding to the terminal;
the terminal calculates a WiFi password uniquely corresponding to the terminal by a pre-agreed algorithm between the terminal and the wireless access point according to a pre-agreed private key between the terminal and the wireless access point and the address uniquely corresponding to the terminal carried in the request information;
the terminal sends a WiFi password uniquely corresponding to the terminal to a wireless access point for access verification, after the WiFi password uniquely corresponding to the terminal is received by the wireless access point, whether the WiFi password uniquely corresponding to the terminal calculated by the wireless access point is the same as the received WiFi password uniquely corresponding to the terminal is judged, if yes, WiFi connection is successfully established between the terminal and the wireless access point, and the WiFi password uniquely corresponding to the terminal calculated by the wireless access point is calculated by the wireless access point according to a private key agreed in advance between the terminal and the wireless access point and an address uniquely corresponding to the terminal carried in the request information by the wireless access point according to an algorithm agreed in advance between the terminal and the wireless access point.
2. The method of claim 1, wherein the request message is generated by the terminal after a user manually selects a wireless access point for establishing the WiFi connection, or is automatically generated by the terminal after detecting the wireless access point.
3. The method of claim 1, wherein the address uniquely corresponding to the terminal is a MAC address of the terminal or an SN code of the terminal.
4. The method of claim 1, wherein the private key is updated periodically.
5. The method of claim 1, wherein said pre-agreed algorithm is a PBKDF2 encryption algorithm; or the like, or, alternatively,
the pre-agreed algorithm is an exclusive-or operation of the MD5 algorithm in combination with a preset rule.
6. The method as claimed in claim 5, wherein the step of the terminal calculating the WiFi password uniquely corresponding to the terminal by using the algorithm agreed in advance between the terminal and the wireless access point according to the private key agreed in advance between the terminal and the wireless access point and the address uniquely corresponding to the terminal carried in the request message is specifically as follows: calculating a 16-byte first MD5 value of a private key agreed in advance between the terminal and the wireless access point, and calculating a 16-byte second MD5 value of the address uniquely corresponding to the terminal carried in the request information;
repeatedly executing 32 operations from the 7 th byte of the first MD5 value and the 13 th byte of the second MD5 value, wherein each operation respectively and circularly takes one byte of the first MD5 value and the second MD5 value to perform exclusive OR operation, and a 32-byte hexadecimal password is generated;
and converting the 32-byte hexadecimal password into a 64-byte character string, and taking the 64-byte character string as the WiFi password which is uniquely corresponding to the terminal.
7. A terminal, comprising:
one or more processors;
a memory; and
one or more computer programs, the processor and the memory being connected by a bus, wherein the one or more computer programs are stored in the memory and configured to be executed by the one or more processors, characterized in that the computer programs, when executed by the processors, implement the steps of the method of establishing a WiFi connection between a terminal and a wireless access point according to any of claims 1 to 6.
8. A method for establishing WiFi connection between a terminal and a wireless access point, the method comprising:
the method comprises the steps that a wireless access point receives request information sent by a terminal, the wireless access point calculates a WiFi password uniquely corresponding to the terminal according to a private key agreed in advance between the terminal and the wireless access point and the address uniquely corresponding to the terminal carried in the request information by an algorithm agreed in advance between the terminal and the wireless access point, the request information is used for requesting to establish WiFi connection with an appointed wireless access point, and the request information carries the appointed wireless access point and the address uniquely corresponding to the terminal;
after the wireless access point receives the WiFi password which is sent by the terminal and uniquely corresponds to the terminal, whether the WiFi password which is calculated by the wireless access point and uniquely corresponds to the terminal is the same as the received WiFi password which is uniquely corresponding to the terminal is judged, and if the WiFi password is the same, WiFi connection is successfully established between the terminal and the wireless access point; the WiFi password which is sent by the terminal and uniquely corresponds to the terminal is calculated by the terminal according to a private key which is pre-agreed between the terminal and the wireless access point and the address which is carried in the request information and uniquely corresponds to the terminal through an algorithm which is pre-agreed between the terminal and the wireless access point.
9. The method of claim 8, wherein after the successful establishment of the WiFi connection between the terminal and the wireless access point, the method further comprises:
and the wireless access point binds the WiFi password which can ensure that the WiFi connection is successfully established between the terminal and the wireless access point with the address uniquely corresponding to the terminal.
10. A wireless access point, comprising:
one or more processors;
a memory; and
one or more computer programs, the processor and the memory being connected by a bus, wherein the one or more computer programs are stored in the memory and configured to be executed by the one or more processors, characterized in that the steps of the method of establishing a WiFi connection between a terminal and a wireless access point according to claim 8 or 9 are implemented when the computer programs are executed by the processors.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011406772.7A CN112616146A (en) | 2020-12-04 | 2020-12-04 | Method for establishing WiFi connection between terminal and wireless access point |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011406772.7A CN112616146A (en) | 2020-12-04 | 2020-12-04 | Method for establishing WiFi connection between terminal and wireless access point |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112616146A true CN112616146A (en) | 2021-04-06 |
Family
ID=75229216
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011406772.7A Pending CN112616146A (en) | 2020-12-04 | 2020-12-04 | Method for establishing WiFi connection between terminal and wireless access point |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112616146A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107040922A (en) * | 2016-05-05 | 2017-08-11 | 腾讯科技(深圳)有限公司 | Wireless network connecting method, apparatus and system |
CN107295519A (en) * | 2017-08-21 | 2017-10-24 | 深圳市信锐网科技术有限公司 | A kind of wireless network access method, apparatus and system |
CN107948974A (en) * | 2017-11-29 | 2018-04-20 | 江苏省未来网络创新研究院 | A kind of WiFi safety certifying methods |
-
2020
- 2020-12-04 CN CN202011406772.7A patent/CN112616146A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107040922A (en) * | 2016-05-05 | 2017-08-11 | 腾讯科技(深圳)有限公司 | Wireless network connecting method, apparatus and system |
CN107295519A (en) * | 2017-08-21 | 2017-10-24 | 深圳市信锐网科技术有限公司 | A kind of wireless network access method, apparatus and system |
CN107948974A (en) * | 2017-11-29 | 2018-04-20 | 江苏省未来网络创新研究院 | A kind of WiFi safety certifying methods |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9459604B2 (en) | Methods and system for joining a smart energy device to a zigbee network | |
JP4812830B2 (en) | Low power transmit provisioning for wireless network devices | |
JP5662512B2 (en) | Method for preventing degradation attack while terminal is moving, mobility management entity, and user equipment | |
CN109462602B (en) | Login information storage method, login verification method, device, equipment and medium | |
CN111107073B (en) | Application automatic login method and device, computer equipment and storage medium | |
CN105450583A (en) | Information authentication method and device | |
CN110266656B (en) | Secret-free authentication identity identification method and device and computer equipment | |
CN105553920A (en) | Data interaction method, apparatus, and system | |
US20170303065A1 (en) | Method and device for creating subscription resource | |
CN108024241A (en) | Terminal accessing authentication method, system and authentication server | |
CN111614548A (en) | Message pushing method and device, computer equipment and storage medium | |
CN110995683A (en) | Hardware information acquisition method and device based on Web page and computer equipment | |
CN106412883B (en) | Method and device for accessing wireless network | |
CN104994501A (en) | Connection method of wireless network and terminal equipment | |
CN113852958A (en) | 5G authentication method, 5G automatic account opening method, device, system and storage medium | |
CN112616146A (en) | Method for establishing WiFi connection between terminal and wireless access point | |
CN112564940B (en) | Distribution network failure processing method and device, equipment and storage medium | |
CN110888892A (en) | Block synchronization method, device and storage medium | |
CN116489762A (en) | Access registration method, device, system, communication equipment and storage medium | |
CN113347069B (en) | Network distribution method and device for household electrical appliance, household electrical appliance and server | |
CN113596823B (en) | Slice network protection method and device | |
CN113015265B (en) | Network session self-healing method, device, system, computer equipment and storage medium | |
CN109561093B (en) | Unauthorized behavior detection method and device, computer equipment and storage medium | |
CN111565392B (en) | Communication method and device | |
CN109429226B (en) | Temporary user certificate generation method, user card, terminal and network equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210406 |