CN102791016B - Access processing method and device - Google Patents

Access processing method and device Download PDF

Info

Publication number
CN102791016B
CN102791016B CN201210231214.0A CN201210231214A CN102791016B CN 102791016 B CN102791016 B CN 102791016B CN 201210231214 A CN201210231214 A CN 201210231214A CN 102791016 B CN102791016 B CN 102791016B
Authority
CN
China
Prior art keywords
access
terminal
module
identification information
cipher authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210231214.0A
Other languages
Chinese (zh)
Other versions
CN102791016A (en
Inventor
门华江
詹昌漫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN XINFENG WEIYE TECHNOLOGY Co Ltd
Datang Mobile Communications Equipment Co Ltd
Original Assignee
SHENZHEN XINFENG WEIYE TECHNOLOGY Co Ltd
Datang Mobile Communications Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN XINFENG WEIYE TECHNOLOGY Co Ltd, Datang Mobile Communications Equipment Co Ltd filed Critical SHENZHEN XINFENG WEIYE TECHNOLOGY Co Ltd
Priority to CN201210231214.0A priority Critical patent/CN102791016B/en
Publication of CN102791016A publication Critical patent/CN102791016A/en
Application granted granted Critical
Publication of CN102791016B publication Critical patent/CN102791016B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses an access processing method and an access processing device. The method comprises the following steps that after the first enabling signal receiving, the operation is switched to a first access mode; and in the first access mode, the preset number of terminals are subjected to password-free authentication access. Through the method and the device provided by the embodiment disclosed by the invention, when the access of a terminal user (a WIFI (wireless fidelity) network) is needed, the enabling signal can be triggered so that the password-free authentication access is carried out in the first access mode. Therefore, the specific terminal can be fast accessed into the network.

Description

A kind of access processing method and device
Technical field
The present invention relates to communication technical field, relate in particular to a kind of access processing method and device.
Background technology
Existingly provide the authentication of the wireless compatibility of WIFI() device of access function, for the fail safe of transfer of data in system, carries out cipher authentication to the terminal of request access.Accordingly, terminal use need to carry out the operations such as corresponding Password Input.For some terminal use, carry out Password Input and access WIFI network and cause terminal use's experience poor.So, cipher authentication process, for a part of terminal use, becomes the obstacle that it uses WIFI network.A kind of solution of quick access WIFI network is not also provided for the terminal of specific request access at present.
Summary of the invention
The object of this invention is to provide a kind of access processing method, so that particular terminal fast access into network.
The object of the invention is to be achieved through the following technical solutions:
An access processing method, comprising:
Receive after the first enable signal, be switched to the first access module;
Under the first access module, the terminal of predetermined number is exempted to cipher authentication access.
An access processing unit, comprising:
Access module handover module, for receiving after the first enable signal, controls access processing module and is switched to the first access module;
Access processing module, under the first access module, exempts from cipher authentication access to the terminal of predetermined number.
The method providing by the embodiment of the present invention and device, if when terminal use needs access (as WIFI network), can trigger the first enable signal, so that under the first access module, exempt from cipher authentication access.Make the particular terminal can fast access into network.
Accompanying drawing explanation
The method flow diagram that Fig. 1 provides for first embodiment of the invention;
The method flow diagram that Fig. 2 provides for second embodiment of the invention;
A kind of access module switch logic schematic diagram that Fig. 3 provides for the embodiment of the present invention;
The method flow diagram that Fig. 4 third embodiment of the invention provides;
The method flow diagram that Fig. 5 provides for four embodiment of the invention;
The apparatus structure schematic diagram that Fig. 6 provides for the embodiment of the present invention.
Embodiment
The embodiment of the present invention provides a kind of access processing method, after receiving the first enable signal, is switched to the first access module; Under the first access module, the terminal of predetermined number N is exempted to cipher authentication access.
In each embodiment of the present invention, predetermined number N refers to, allows to exempt from the terminal number of cipher authentication access.
The method providing by the embodiment of the present invention, if when terminal use needs access (as WIFI network), can trigger the first enable signal, so that under the first access module, exempts from cipher authentication access.Make the particular terminal can fast access into network.
Below in conjunction with accompanying drawing, the method that the embodiment of the present invention is provided is elaborated.
In an embodiment, the maximum that above-mentioned predetermined number N is less than permission several M that access terminal.Access processing unit and carry out access processing method as shown in Figure 1, comprise following operation:
Step 100, receive after the first enable signal, be switched to the first access module.
Step 110, under the first access module, the terminal of predetermined number N is exempted to cipher authentication access, obtain and preserve and exempt from the identification information that cipher authentication accesses terminal.
In various embodiments of the present invention, same terminal is the access of multi-time no cipher authentication under the first access module, and its number is denoted as 1.For example, there is terminal by exempting from cipher authentication mode, to access under the first access module.Subsequently, this terminal exits access.Still under current the first access module, this terminal is asked access again.For this situation, when identical terminal multi-time no cipher authentication accesses, number is denoted as 1.
Step 120, when exempting from the number that cipher authentication accesses terminal, reach predetermined number N, be switched to the second access module.
Step 130, under the second access module, obtain the identification information of the terminal of request access, judge that whether the identification information of the terminal that this request accesses identical with the identification information of a preservation.
If so, execution step 140, the terminal of this request access exempted to cipher authentication access.
By above-mentioned processing procedure, when terminal successfully accesses by exempting from the mode of cipher authentication under the first access module.So, for such particular terminal, under the second access module, can to it, exempt from cipher authentication by matching identification information and access.Can unique identification terminal due to identification information, therefore, the authentication access procedure of matching identification information is than the access procedure of cipher authentication, and fail safe is higher.In addition, because the terminal number of exempting from cipher authentication access allowing is less than the maximum number that accesses terminal, and specific terminal do not need to input the i.e. accessible access of password, and therefore, the access procedure required time of matching identification information is less than cipher authentication access required time.By matching identification information, specific terminal being exempted to cipher authentication access implementation is also a kind of quick access way.
In above-mentioned processing procedure, under the second access module, if the identification information of terminal and the identification information of preservation of request access are all not identical, can control according to the current number that accesses terminal the access of this terminal.Exemplify two kinds of implementations below:
One, the maximum whether the terminal number that judges current access reaches permission several M that access terminal, if so, refuse the access request of the terminal of above-mentioned request access, otherwise the terminal that this request is accessed are carried out cipher authentication access.
Its two, can access network in order to guarantee to exempt from the terminal of cipher authentication access, can be only in the terminal number of current access, be not more than P(P=M-N, M is the maximum the allowing number that accesses terminal, N be above-mentioned predetermined number) time, allow terminal to carry out cipher authentication access.Whether the terminal number that judges current access reaches P, if so, refuses the access request of the terminal of above-mentioned request access, otherwise, the terminal of this request access is carried out to cipher authentication access.
For the current counting accessing terminal, can realize in the following way: whenever there being a terminal access, counting adds 1, and whenever there being a terminal to exit, counting subtracts 1.
Wherein, during device shutdown, automatically preserve current access module information, when device enters the access module before shutdown after start again automatically.In addition, when device shutdown, the identification information of having preserved is not deleted.
The implementation that the terminal of control predetermined number is exempted from cipher authentication access has a variety of.Exemplify wherein a kind of below: if allow to exempt from the terminal number of cipher authentication access, be greater than 1, by counter, to exempting from the cipher authentication number that accesses terminal, count.
When being switched to the first access module, the value of this counter is initial value 0.
Every pair of terminal is exempted from cipher authentication access, judge whether this terminal carried out exempting from cipher authentication access under current the first access module, and if so, the value of counter is constant, otherwise the value of this counter adds 1.
If the value of counter reaches N, be switched to the second access module.
Judge whether terminal is repeatedly exempted from the specific implementation of password access and had a variety of.For example, in terminal, exempt from, after password access, to obtain the identification information of this terminal, whether judgement this locality has preserved identical identification information.If so, represent that this terminal not exempts from cipher authentication access first, if not, represent that this terminal exempts from cipher authentication access first, preserve the identification information of this terminal.
In an embodiment, the maximum that above-mentioned predetermined number N equals to allow several M that access terminal.Access processing method as shown in Figure 2, comprises following operation:
Step 200, receive after the first enable signal, be switched to the first access module;
Step 210, under the first access module, the terminal of predetermined number N is exempted to cipher authentication access, obtain and preserve and exempt from the identification information that cipher authentication accesses terminal;
Step 220, when exempting from the number that cipher authentication accesses terminal, reach predetermined number N, be switched to the second access module;
Step 230, under the second access module, obtain the identification information of the terminal of request access, judge that whether the identification information of the terminal that this request accesses identical with the identification information of a preservation;
If so, execution step 240, the terminal of this request access exempted to cipher authentication access;
Otherwise, execution step 250, refuse the access request of the terminal that this request accesses.
Wherein, during device shutdown, automatically preserve current access module information, when device enters the access module before shutdown after start again automatically.In addition, when device shutdown, the identification information of having preserved is not deleted.
The implementation that the terminal of control predetermined number is exempted from cipher authentication access has a variety of.Specifically can, with reference to the description of a upper embodiment, repeat no more here.
On the basis of above-mentioned two embodiment.The method that the embodiment of the present invention provides can also comprise: receive after the second enable signal, delete the identification information of the terminal of exempting from cipher authentication access of preserving, and be switched to the 3rd access module.Under the 3rd access module, terminal is accessed to the mode of processing to be had multiple.Exemplify several below:
(1), under the 3rd access module, in the maximum allowing accesses terminal the scope of several M, the terminal of request access is carried out to cipher authentication access.
Concrete, if the terminal number of current access does not reach the maximum of permission several M that access terminal, the terminal of request access is carried out to cipher authentication access, otherwise, the access request of refusal terminal.
(2), under the 3rd access module, in the maximum allowing accesses terminal the scope of several M, the terminal of request access is exempted to cipher authentication access.
Concrete, if the terminal number of current access does not reach the maximum of permission several M that access terminal, the terminal of request access is exempted to cipher authentication access, otherwise, the access request of refusal terminal.
Under the 3rd access module, can determine concrete which kind of access way that adopts according to the Default Value of device, also can set concrete access way according to user's actual demand.
In an embodiment, take WIFI access as example, the access way of the embodiment of the present invention is elaborated.Suppose to provide the device of WIFI access function to be preset with three kinds of access modules, and above-mentioned predetermined number N is 1, the maximum that is less than permission several M that access terminal.
Under the first access module, only allow a terminal to access WIFI network by exempting from the mode of cipher authentication, and preserve the identification information of this terminal.
Under the second access module, only allow the terminal of having preserved identification information in device to exempt from cipher authentication access WIFI network, for other-end, if allow its access, need cipher authentication access network.
Under the 3rd access module, according to the actual disposition of device, in the maximum allowing accesses terminal the scope of several M, all terminals all need cipher authentication access WIFI network, or in the maximum allowing accesses terminal the scope of several M, all terminals are all exempted from cipher authentication access WIFI network.
Switching between above-mentioned three kinds of access modules as shown in Figure 3, can be passed through the first enable signal, from the 3rd access module, is switched to the first access module.Can pass through the second enable signal, from the first access module or the second access module, be switched to the 3rd access module.When there being a terminal to access WIFI network by exempting from cipher authentication mode, from the first access module, be switched to the second access module.Due under the first access module and the second access module, specific terminal can be in order to avoid cipher authentication be realized access fast.Therefore, also can think and trigger quick access function by the first enable signal, specifically by being operated in the first access module and the second access module is realized quick access function.Think and close quick access function by the second enable signal.
Accordingly, WIFI network insertion processing method as shown in Figure 4, specifically comprises following operation:
Step 400, reception the first enable signal, be switched to the first access module.
Concrete, this first enable signal is triggered by hardware or software mode by user.
The access request of step 410, receiving terminal A, exempts from cipher authentication access to terminal A, obtains and preserves the identification information of terminal A, and be switched to the second access module.
Wherein, the identification information of terminal can but be not limited only to be MAC Address, IP address, phone number etc. can be in access network the information of unique identification terminal.
Under the second access module, if there is terminal request access WIFI network, the access request of execution step 420, receiving terminal, obtains the identification information of terminal, judges that whether the identification information of this terminal is identical with the identification information of a preservation;
If so, execution step 430, this terminal is exempted to cipher authentication access.
Otherwise, perform step 440, judge whether the terminal number of current access reaches P(P=M-N).
If so, execution step 450, refuse the access request of this terminal.
Otherwise, perform step 460, this terminal carried out to cipher authentication access.
Terminal A, after exempting from cipher authentication access WIFI network, may (for example shut down) and exit WIFI network for some reason.When terminal A asks to access WIFI network again, if in the second access module, can compare by identification information, for providing, terminal A exempts from cipher authentication access.
Because identification information can unique identification terminal, therefore the access way that the embodiment of the present invention provides, under the second access module, the mode of mating by identification information authenticates the terminal of request access, access way than cipher authentication has not only improved access speed, has also improved the fail safe of access.
Under above-mentioned the first access module or the second access module, if receive the second enable signal, be switched to the 3rd access module, and delete the identification information of having preserved.
For example, terminal use need to, by triggering the first enable signal, access WIFI network by exempting from the mode of cipher authentication fast under the first access module.But there is other-end to try to be the first, carried out exempting from cipher authentication access.Now, this terminal use can, by triggering the second enable signal, delete the identification information of preserving.And again trigger the first enable signal, attempt by exempting from the mode of cipher authentication, accessing WIFI network fast under the first access module.
In an embodiment, take WIFI access as example, the access way of the embodiment of the present invention is elaborated.Suppose to provide the device of WIFI access function to be preset with three kinds of access modules, the maximum that above-mentioned predetermined number N equals to allow several M that access terminal.
Under the first access module, allow N terminal to access WIFI network by exempting from the mode of cipher authentication, and preserve the identification information of each terminal.
Under the second access module, only allow the terminal of having preserved identification information in device to exempt from cipher authentication access WIFI network.
Under the 3rd access module, according to the actual disposition of device, within the scope of the maximum allowing accesses terminal several M, all terminals all need cipher authentication access WIFI network, or within the scope of the maximum allowing accesses terminal several M, all terminals are all exempted from cipher authentication access WIFI network.
Switching between above-mentioned three kinds of access modules as shown in Figure 3, can be passed through the first enable signal, from the 3rd access module, is switched to the first access module.Can pass through the second enable signal, from the first access module or the second access module, be switched to the 3rd access module.When there being N terminal to access WIFI network by exempting from cipher authentication mode, from the first access module, be switched to the second access module.Due under the first access module and the second access module, specific terminal can be in order to avoid cipher authentication be realized access fast.Therefore, also can think and trigger quick access function by the first enable signal, specifically by being operated in the first access module and the second access module is realized quick access function.Think and close quick access function by the second enable signal.
Accordingly, WIFI network insertion processing method as shown in Figure 5, specifically comprises following operation:
Step 500, receive the first enable signal, be switched to the first access module, exempt from the access terminal Counter Value of number of cipher authentication and be set to initial value 0.
Concrete, this first enable signal is triggered by hardware or software mode by user.
The access request of step 510, receiving terminal, exempts from cipher authentication access to this terminal, obtains the identification information of this terminal.
Wherein, the identification information of terminal can but be not limited only to MAC Address, IP address, phone number etc. can be in access network the information of unique identification terminal.
In step 520, judgment means, whether preserved the identification information of this terminal, if so, execution step 540, otherwise, execution step 530.
Step 530, preserve the identification information of this terminal, and Counter Value is added to 1, execution step 540;
Step 540, judge whether Counter Value reaches predetermined number N, if so, be switched to the second access module, otherwise, step 510 returned to.
Under the second access module, if there is terminal request access WIFI network, the access request of execution step 550, receiving terminal, obtains the identification information of terminal, judges that whether the identification information of this terminal is identical with the identification information of a preservation;
If so, execution step 560, this terminal is exempted to cipher authentication access.
Otherwise, execution step 570, refuse the access request of this terminal.
Terminal A, after exempting from cipher authentication access WIFI network, may (for example shut down) and exit WIFI network for some reason.When terminal A asks to access WIFI network again, if in the second access module, can compare by identification information, for providing, terminal A exempts from cipher authentication access.
Because identification information can unique identification terminal, therefore the access way that the embodiment of the present invention provides, under the second access module, the mode of mating by identification information authenticates the terminal of request access, access way than cipher authentication has not only improved access speed, has also improved the fail safe of access.
Under above-mentioned the first access module or the second access module, if receive the second enable signal, be switched to the 3rd access module, and delete the identification information of having preserved.
For example, terminal use need to, by triggering the first enable signal, access WIFI network by exempting from the mode of cipher authentication fast under the first access module.But there is other-end to try to be the first, carried out exempting from cipher authentication access.Now, this terminal use can, by triggering the second enable signal, delete the identification information of preserving.And again trigger the first enable signal, attempt by exempting from the mode of cipher authentication, accessing WIFI network fast under the first access module.
The embodiment of the present invention provides a kind of access processing unit, and its implementation structure as shown in Figure 6, specifically comprises:
Access module handover module 60, for receiving after the first enable signal, controls access processing module 61 and is switched to the first access module;
Access processing module 61, under the first access module, exempts from cipher authentication access to the terminal of predetermined number.
The device providing by the embodiment of the present invention, if when terminal use needs access (as WIFI network), can trigger the first enable signal, so that under the first access module, exempts from cipher authentication access.
Preferably, described access processing module 61 also for, under the first access module, obtain and preserve and exempt from the identification information that cipher authentication accesses terminal.When exempting from the number that cipher authentication accesses terminal, reach described predetermined number, access module handover module 60 also for, control access processing module 61 and be switched to the second access module.Access processing module 61, also under the second access module, is obtained the identification information of the terminal of request access, judges that whether the identification information of the terminal that described request accesses is identical with the identification information of a preservation; If so, the terminal of described request access is exempted to cipher authentication access.
Preferably, under the second access module, if the identification information of terminal and the identification information of preservation of above-mentioned request access are all not identical, access processing module 61 also for: whether the terminal number that judges current access reaches P, if, the reject said request access request of terminal of access, otherwise, the terminal of described request access is carried out to cipher authentication access; Wherein, P=M-N, M is the maximum the allowing number that accesses terminal.
Preferably, described access processing module 61 also for, under the first access module, obtain and preserve and exempt from the identification information that cipher authentication accesses terminal.When exempting from the number that cipher authentication accesses terminal, reach described predetermined number, access module handover module 60 also for, control access processing module 61 and be switched to the second access module.Access processing module 61, also under the second access module, is obtained the identification information of the terminal of request access, judges that whether the identification information of the terminal that described request accesses is identical with the identification information of a preservation; If so, the terminal of described request access is exempted to cipher authentication access; Otherwise, refuse the access request of described terminal.
Preferably, described access module handover module 60 also for, receive after the second enable signal, delete the identification information of the terminal of exempting from cipher authentication access that access processing module 61 preserves, and control access processing module 61 and be switched to the 3rd access module.Access processing module 61 can also, under the 3rd access module, in the maximum allowing accesses terminal several scopes, be carried out cipher authentication access to the terminal of request access.Access processing module 61 also can, under the 3rd access module, in the maximum allowing accesses terminal several scopes, be exempted from cipher authentication access to the terminal of request access.
Concrete access way under the 3rd access module, can, with reference to the description of said method embodiment, repeat no more here.
The method and apparatus that the embodiment of the present invention provides, can be applied to WIFI access network.Can be specifically RJ45(Ethernet interface) the wired WIFI of turning network, 2G(second generation mobile communication system)/3G(3-G (Generation Three mobile communication system))/LTE(Long Term Evolution) turn WIFI network, WIFI turns WIFI network etc., accordingly, device provided by the invention is for providing the AP(access point of WIFI access function).
The method and apparatus that the embodiment of the present invention provides, also can be applied to other access networks.For example, Microcell access, corresponding, device provided by the invention is microcell base station.Or, local area network (LAN) access, corresponding, device provided by the invention is LAN gateway.Or, the terminal accessing Internet in local area network (LAN), corresponding, device provided by the invention is LAN gateway.
Obviously, those skilled in the art can carry out various changes and modification and not depart from the spirit and scope of the present invention the present invention.Like this, if within of the present invention these are revised and modification belongs to the scope of the claims in the present invention and equivalent technologies thereof, the present invention is also intended to comprise these changes and modification interior.

Claims (8)

1. an access processing method, is characterized in that, comprising:
Receive after the first enable signal, be switched to the first access module;
Under the first access module, the terminal of predetermined number N is exempted to cipher authentication access;
Under the first access module, obtain and preserve and exempt from the identification information that cipher authentication accesses terminal;
When exempting from the number that cipher authentication accesses terminal, reach described predetermined number N, be switched to the second access module;
Under the second access module, obtain the identification information of the terminal of request access, judge that whether the identification information of the terminal that described request accesses is identical with the identification information of a preservation;
If so, the terminal of described request access is exempted to cipher authentication access.
2. method according to claim 1, is characterized in that, under the second access module, if the identification information of terminal and the identification information of preservation of described request access are all not identical, the method also comprises:
Whether the terminal number that judges current access reaches P, if so, and the access request of the terminal of the access that rejects said request, otherwise, the terminal of described request access is carried out to cipher authentication access; Wherein, P=M-N, M is the maximum the allowing number that accesses terminal.
3. method according to claim 1, is characterized in that, under the second access module, if the identification information of terminal and the identification information of preservation of described request access are all not identical, the method also comprises:
Refuse the access request of described terminal.
4. according to the method described in claim 1~3 any one, it is characterized in that, the method also comprises:
Receive after the second enable signal, delete the identification information of the terminal of exempting from cipher authentication access of preserving, and be switched to the 3rd access module;
Under the 3rd access module, in the maximum allowing accesses terminal several scopes, the terminal of request access is carried out to cipher authentication access; Or, under the 3rd access module, in the maximum allowing accesses terminal several scopes, the terminal of request access is exempted to cipher authentication access.
5. an access processing unit, is characterized in that, comprising:
Access module handover module, for receiving after the first enable signal, controls access processing module and is switched to the first access module;
Access processing module, under the first access module, exempts from cipher authentication access to the terminal of predetermined number; Under the first access module, obtain and preserve and exempt from the identification information that cipher authentication accesses terminal;
When exempting from the number that cipher authentication accesses terminal, reach described predetermined number, described access module handover module also for, control described access processing module and be switched to the second access module;
Described access processing module also for:
Under the second access module, obtain the identification information of the terminal of request access, judge that whether the identification information of the terminal that described request accesses is identical with the identification information of a preservation;
If so, the terminal of described request access is exempted to cipher authentication access.
6. device according to claim 5, is characterized in that, under the second access module, if the identification information of terminal and the identification information of preservation of described request access are all not identical, described access processing module also for:
Whether the terminal number that judges current access reaches P, if so, and the access request of the terminal of the access that rejects said request, otherwise, the terminal of described request access is carried out to cipher authentication access; Wherein, P=M-N, M is the maximum the allowing number that accesses terminal.
7. device according to claim 5, is characterized in that, under the second access module, if the identification information of terminal and the identification information of preservation of described request access are all not identical, described access processing module also for:
Refuse the access request of described terminal.
8. according to the device described in claim 5~7 any one, it is characterized in that, described access module handover module also for:
Receive after the second enable signal, the identification information of the terminal of exempting from cipher authentication access of delete preserving, and control described access processing module and be switched to the 3rd access module;
Under the 3rd access module, in the maximum allowing accesses terminal several scopes, the terminal of request access is carried out to cipher authentication access; Or, under the 3rd access module, in the maximum allowing accesses terminal several scopes, the terminal of request access is exempted to cipher authentication access.
CN201210231214.0A 2012-07-04 2012-07-04 Access processing method and device Active CN102791016B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210231214.0A CN102791016B (en) 2012-07-04 2012-07-04 Access processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210231214.0A CN102791016B (en) 2012-07-04 2012-07-04 Access processing method and device

Publications (2)

Publication Number Publication Date
CN102791016A CN102791016A (en) 2012-11-21
CN102791016B true CN102791016B (en) 2014-12-10

Family

ID=47156295

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210231214.0A Active CN102791016B (en) 2012-07-04 2012-07-04 Access processing method and device

Country Status (1)

Country Link
CN (1) CN102791016B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015035620A1 (en) 2013-09-13 2015-03-19 华为终端有限公司 Processing method of wireless network equipment, wireless network equipment and processor thereof
CN104469764A (en) * 2013-09-16 2015-03-25 中兴通讯股份有限公司 WLAN (Wireless Local Area Network) networking method and system
CN104350705B (en) * 2014-03-13 2018-06-05 华为终端有限公司 A kind of method of wireless router and its switch communication mode
WO2015180192A1 (en) 2014-05-31 2015-12-03 华为技术有限公司 Network connection method, hotspot terminal, and management terminal
US9674768B2 (en) 2014-07-28 2017-06-06 Xiaomi Inc. Method and device for accessing wireless network
CN104837175B (en) * 2015-04-01 2018-09-25 普联技术有限公司 A kind of connection control method and device of wireless router
CN105848147A (en) * 2015-07-28 2016-08-10 维沃移动通信有限公司 Network connection method and device, and Wi-Fi routing equipment
CN108990133A (en) * 2018-08-02 2018-12-11 中国联合网络通信集团有限公司 A kind of wireless network access method and system
CN109151818B (en) 2018-08-07 2021-08-17 西安易朴通讯技术有限公司 Terminal verification method, AP (access point) equipment, terminal and system
CN109981681A (en) * 2019-04-10 2019-07-05 广东虹勤通讯技术有限公司 A kind of wireless network access method and Wireless networking systems
CN110493779B (en) * 2019-08-23 2022-01-25 Oppo广东移动通信有限公司 Wireless network connection method and related device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101192916A (en) * 2006-11-23 2008-06-04 华为技术有限公司 Wireless access method and wireless access device
CN101610577A (en) * 2008-06-18 2009-12-23 中兴通讯股份有限公司 The access control apparatus of Wireless Telecom Equipment and connection control method thereof
CN101895855A (en) * 2009-05-18 2010-11-24 中国移动通信集团公司 Mobile terminal access method, base station and access system
CN101895962A (en) * 2010-08-05 2010-11-24 华为终端有限公司 Wi-Fi (wireless fidelity) access method, access point and Wi-Fi access system
CN102056154A (en) * 2009-10-30 2011-05-11 华为技术有限公司 IKE (Internet Key Exchange) authentication method and system, IKE response equipment and IKE initiating equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE502004011533D1 (en) * 2004-01-06 2010-09-23 Kaba Ag ACCESS CONTROL SYSTEM AND METHOD OF OPERATION THEREOF

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101192916A (en) * 2006-11-23 2008-06-04 华为技术有限公司 Wireless access method and wireless access device
CN101610577A (en) * 2008-06-18 2009-12-23 中兴通讯股份有限公司 The access control apparatus of Wireless Telecom Equipment and connection control method thereof
CN101895855A (en) * 2009-05-18 2010-11-24 中国移动通信集团公司 Mobile terminal access method, base station and access system
CN102056154A (en) * 2009-10-30 2011-05-11 华为技术有限公司 IKE (Internet Key Exchange) authentication method and system, IKE response equipment and IKE initiating equipment
CN101895962A (en) * 2010-08-05 2010-11-24 华为终端有限公司 Wi-Fi (wireless fidelity) access method, access point and Wi-Fi access system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
可信无线接入认证模型的研究与设计;孙鹏;《中国优秀硕士学位论文全文数据库 信息科技辑》;20100630;全文 *
孙鹏.可信无线接入认证模型的研究与设计.《中国优秀硕士学位论文全文数据库 信息科技辑》.2010, *

Also Published As

Publication number Publication date
CN102791016A (en) 2012-11-21

Similar Documents

Publication Publication Date Title
CN102791016B (en) Access processing method and device
US11451950B2 (en) Indirect registration method and apparatus
CN103997768B (en) A kind of method and device for preventing from accessing invalid Wi Fi focuses
US9526008B2 (en) Identity module with interchangeable unique identifiers
EP2922327A1 (en) Communications terminal and system and rights management method
CN101577908B (en) User equipment verification method, device identification register and access control system
CN109041140B (en) Method for rapidly switching wireless network, intelligent hardware and terminal equipment
KR101890543B1 (en) Method and devices for providing a subscription profile on a mobile terminal
US20140200000A1 (en) System and Method for Network Selection
CN105635084A (en) Apparatus and method for authenticating terminal
CN113206814B (en) Network event processing method and device and readable storage medium
US20150098430A1 (en) Channel switching method, apparatus, and device
CN107277878B (en) Method for switching network, device and mobile terminal
EP3468260A1 (en) Method and device for reducing power consumption of terminal, and smart card
EP3176720A1 (en) Method, device and system for authenticating to a mobile network and a server for authenticating devices to a mobile network
EP3675541A1 (en) Authentication method and device
CN108616805B (en) Emergency number configuration and acquisition method and device
WO2016173339A1 (en) Network access method and mobile communication terminal
US11202201B2 (en) Subscriber identity module which has multiple profiles and which is designed for an authentication command
US20140181902A1 (en) Authentication in a wireless access network
EP3111611B1 (en) A node and a method for enabling network access authorization
US20140357315A1 (en) Next generation smart card
CN116017454A (en) Authentication method, device, equipment and storage medium based on service access
CN105357671A (en) System and method for connecting wireless access points with same SSID and different passwords
JP2013074606A (en) Radio router, program and access method for controlling access by child radio terminal subordinate to parent radio terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant