CN103249040B - Method and device for wireless access authentication - Google Patents

Method and device for wireless access authentication Download PDF

Info

Publication number
CN103249040B
CN103249040B CN201210027511.3A CN201210027511A CN103249040B CN 103249040 B CN103249040 B CN 103249040B CN 201210027511 A CN201210027511 A CN 201210027511A CN 103249040 B CN103249040 B CN 103249040B
Authority
CN
China
Prior art keywords
user equipment
gateway device
new key
key
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210027511.3A
Other languages
Chinese (zh)
Other versions
CN103249040A (en
Inventor
张凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Global Innovation Polymerization LLC
Tanous Co
Original Assignee
Huawei Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Device Co Ltd filed Critical Huawei Device Co Ltd
Priority to CN201210027511.3A priority Critical patent/CN103249040B/en
Priority to PCT/CN2013/070886 priority patent/WO2013117131A1/en
Publication of CN103249040A publication Critical patent/CN103249040A/en
Application granted granted Critical
Publication of CN103249040B publication Critical patent/CN103249040B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a method and device for wireless access authentication, which relate to the field of wireless communication and can be used for preventing a secret key from being broken. The method comprises the following steps: the frequency of consecutive failures in access of first user equipment to gateway device is counted and recorded after that feature characters of the first user equipment are not prestored in the gateway device and the first user equipment fails to use a secret key for the first time to try to access the gateway device are judged; if the frequency is larger than a pre-arranged first threshold value, a new secret key can be generated, and WiFi access authentication is performed on user equipment of the gateway device of which the feature characters are prestored through the new secret key; and the embodiment of the invention is used for wireless access authentication.

Description

A kind of method and device of wireless access certification
Technical field
The present invention relates to wireless communication field, more particularly to a kind of method and device of wireless access certification.
Background technology
With the development of radio communication, technology is increasingly for Wireless Fidelity (wireless fidelity, abbreviation WIFI) Generally, WIFI access points access key safety also becomes the problem of technical staff's research, due at the beginning of existing WIFI access points Beginning key is all that Default Value is good or the sequence of a completely random is provided for the default key of WIFI access points by manufacturer Number, and general user will not change these Default Values, and these keys are all unalterable, and user uses all the time this Key, as long as hacker has found that rule therein or the method to travel through attack WIFI access points, then will be to WIFI equipment Safety affect greatly, so, it is impossible to ensure that user normally uses WIFI equipment, and if connected by hacker It is that user brings great inconvenience in WIFI equipment, it is impossible to ensure the interests of user.
The content of the invention
Embodiments of the invention provide a kind of method and device of wireless access certification, to prevent key to be cracked.
To reach above-mentioned purpose, embodiments of the invention are adopted the following technical scheme that:
On the one hand, there is provided a kind of method of wireless access certification, including:
It is not pre-stored in gateway device in the tagged word for judging first user equipment, and the first user equipment makes first Attempted access to after gateway device failure with key,
Count and record the number of times of the continuous failure of the first user equipment accessing gateway equipment;
If the number of times is more than default first threshold, generate new key, and by the new key to tagged word not Being pre-stored in the user equipment of gateway device carries out WIFI access authentications.
On the one hand, there is provided a kind of device of wireless access certification, including:
Judging unit, for judging whether the tagged word of first user equipment is pre-stored in gateway device, and described Whether one user equipment attempts access to gateway device using key first successful;
Statistic record unit, counts and records the number of times of the continuous failure of the first user equipment accessing gateway equipment;
Key generating unit, for after the number of times is more than default first threshold, generating new key;
Authentication ' unit, the user equipment for not being pre-stored in gateway device to tagged word by the new key carries out WIFI Access authentication.
The method and device of wireless access certification provided in an embodiment of the present invention, is not pre-stored in gateway and sets in judging characteristic word User equipment in standby is more than after default first threshold with the number of times of gateway device connection failure, generates new key, and passes through The new key is not pre-stored in the user equipment of gateway device to tagged word and carries out WIFI access authentications, so, raw with dynamic Into the mode of new key, it is therefore prevented that key is cracked.
Description of the drawings
Technical scheme in order to be illustrated more clearly that the embodiment of the present invention, below will be to embodiment or description of the prior art Needed for the accompanying drawing to be used be briefly described, it should be apparent that, drawings in the following description be only the present invention some Embodiment, for those of ordinary skill in the art, on the premise of not paying creative work, can be with attached according to these Figure obtains other accompanying drawings.
Fig. 1 is one of schematic flow sheet of method of wireless access certification provided in an embodiment of the present invention;
Fig. 2 is the two of the schematic flow sheet of the method for wireless access certification provided in an embodiment of the present invention;
Fig. 3 is the three of the schematic flow sheet of the method for wireless access certification provided in an embodiment of the present invention;
Fig. 4 is the four of the schematic flow sheet of the method for wireless access certification provided in an embodiment of the present invention;
Fig. 5 is one of schematic diagram of device of wireless access certification provided in an embodiment of the present invention;
Fig. 6 is the two of the schematic diagram of the device of wireless access certification provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
The method of wireless access certification provided in an embodiment of the present invention, under normal conditions, the executive agent of this method is Gateway, gateway is when using intercommunication is carried out between different architecture or the network of agreement, for providing protocol conversion, route The facility of the Web-compatible function such as selection, data exchange.When there is equipment to pass through gateway transmission data, gateway typically can be recorded The tagged word of the equipment of data is sent by it, for future use, the tagged word of the equipment is equipment " identity card ", such as equipment Physical address (Media Access Control, abbreviation MAC) etc..Gateway device in the present embodiment can be specially WIFI Equipment or wireless router etc..The method as shown in figure 1, including:
S101, is not pre-stored in gateway device in the tagged word for judging first user equipment, and first user equipment is first Attempt access to after gateway device failure, count and record what the first user equipment accessing gateway equipment continuously failed using key Number of times.
Preferably, this feature word either organization unique identifier (OUI) or can go out plant for physical address (MAC) Serial number (SN) or IP address, illustrate in the present embodiment by taking MAC as an example.
Specifically, as shown in Fig. 2 when first user equipment is attempted being connected with gateway device first, using first first The MAC of family equipment is matched with the MAC prestored in MAC inventories in gateway device or MAC lists, to judge first user equipment MAC whether be the MAC being pre-stored in gateway device, if the MAC for judging first user equipment is pre-stored in gateway device MAC, then carry out WIFI access authentications by original cipher key to first user equipment, before the original cipher key is to generate new key, user Equipment and gateway device carry out the key used during WIFI access authentications;If the MAC for judging first user equipment does not prestore MAC in gateway device, then judge that whether successful first user equipment is connected with gateway device, if judgement is unsuccessful, unite Count and record the number of times of the continuous failure of first user equipment accessing gateway equipment.
Exemplary, in the present embodiment original cipher key is 123456, when user equipment first attempts to be connected with gateway device, Judge that user equipment first is the user equipment that MAC is not pre-stored in gateway device, and user equipment first is with gateway device first After using non-123456 password connection failure, the number of times of the continuous failure of user equipment first accessing gateway equipment is counted and recorded.
S102, if the number of times is more than default first threshold, generates new key, and by the new key to tagged word not Being pre-stored in the user equipment of gateway device carries out WIFI access authentications.
It is exemplary, continuously carried out as a example by failure 10 times by counting user equipment first accessing gateway equipment in above-mentioned steps Illustrate, default first threshold is 8 times, the number of times of the continuous failure of user equipment first is then given birth to more than after default first threshold 8 Into new key 546213, after new key is generated, MAC is not pre-stored in the user equipment second of gateway device after user equipment first Also gateway device is connected, then the new key 546213 by generating carries out WIFI access authentications to user equipment second, so, When attempting breaking cryptographic keys with gateway device connection is connected if illegitimate user equipment, gateway can automatically change key, due to non- Method user equipment is difficult to learn new key, therefore effectively prevent key and be cracked.
The method of wireless access certification provided in an embodiment of the present invention, is not pre-stored in gateway device in judging characteristic word User equipment is more than after default first threshold with the number of times of gateway device connection failure, generates new key, and by the Xinmi City Key is not pre-stored in the user equipment of gateway device to tagged word and carries out WIFI access authentications, so, with dynamic Xinmi City is generated The mode of key, it is therefore prevented that key is cracked.
If it should be noted that judge that the MAC of user equipment for attempting access to gateway device is pre-stored in gateway device, After the equipment obtains new key, the user equipment that gateway device can also be pre-stored in the MAC by new key carries out WIFI Access authentication.
Further, after new key is generated, as shown in figure 3, the method also includes:
S103, received by radio port and from tagged word be pre-stored in gateway device and success identity is to WIFI access points The new key of user equipment check message.
S104, the new key is sent to the user equipment.
Exemplary, illustrating as a example by user equipment first in above step, the user that MAC is pre-stored in gateway device sets Standby third after original cipher key and gateway device are set up and are wirelessly connected, and user equipment first attempts a connection to the gateway device, due to not knowing Road new key 546213 thus be can not by wireless access on the gateway device, but, user equipment third can be to the net Pass equipment sends the message for checking new key, treats that the gateway device receives looking into from user equipment third by radio port After seeing new key message, by the new key 546213 further through being wirelessly transmitted to user equipment third, the use of user equipment third Family is told again the user of user equipment first by new key.So, user equipment first can just learn Xinmi City by user equipment third Key is simultaneously wirelessly connected on the gateway device, so, both ensure that MAC had not been pre-stored in the user equipment of gateway device just The gateway device is often used, but dynamic generates new key, it is therefore prevented that and key is cracked.
As another implementation of the invention, after new key is generated, as shown in figure 4, can also include:
S105, message is checked by the new key of physical port receive user equipment.
S106, the new key is sent to the user equipment.
Exemplary, upper user equipment first can also be directly connected on the physical port of gateway device, set to gateway Preparation is sent and checks new key message, after the gateway device receive physical port transmission check new key message after, by thing Reason port sends new key 546213 and gives user equipment first, and such user equipment first just can be further through nothing after new key is obtained Line is connected on gateway device, and similarly, user equipment third not only can be by wirelessly checking new key 546213, can be with Checked by being linked on the physical port of gateway device, so, also ensure that MAC is not pre-stored in gateway device User equipment normally uses the gateway device.
Preferably, it is pre-stored in after the user equipment of gateway device all used new key 546213 after tagged word, may be used also It is invalid so that original cipher key 123456 to be set to, so, more effectively prevent key to be cracked.
Preferably, can also treat that tagged word is pre-stored in the user equipment of gateway device and has all used newly in the present embodiment After key, it is allowed to which initially use dispatch from the factory key and gateway device complete the user equipment that certification is connected and use key and the gateway of dispatching from the factory Equipment is authenticated connection, and other original cipher keys are set to invalid, and so, be effectively prevented that key is cracked is same When, it is ensured that user normally uses gateway device.
Preferably, the number of times of the continuous failure of the first user equipment accessing gateway equipment is counted and recorded in S101, Can also be:Count and record the first user equipment accessing gateway equipment in default very first time thresholding continuously to fail Number of times.
Exemplary, it is 1 minute to preset the very first time thresholding, can count and record user equipment first in 1 minute The number of times being connected with gateway device, if the number of times is more than default first threshold, generates new key, so, more effectively Judge whether need to change key, so as to further prevent key to be cracked.
The device 50 of wireless access certification provided in an embodiment of the present invention, as shown in figure 5, including,
Judging unit 501, for judging whether the tagged word of first user equipment is pre-stored in gateway device, and first Whether user equipment attempts access to gateway device using key first successful.
Preferably, this feature word either organization unique identifier (OUI) or can go out plant for physical address (MAC) Serial number (SN) or IP address, illustrate in the present embodiment by taking MAC as an example.
Exemplary, in the present embodiment, when user equipment first attempts to be connected with gateway device first, judging unit 501 Judge that whether the user equipment first is that MAC is pre-stored in the user equipment of gateway device, and judge the user equipment first and gateway Whether equipment first connection fails.
Statistic record unit 502, counts and records the number of times of the continuous failure of the first user equipment accessing gateway equipment.
Exemplary, original cipher key is 123456, when judging unit 501 judges that user equipment first is not pre-stored in gateway for MAC The user equipment of equipment, and judge after the user equipment first first connection failure, to count and record user equipment first and attempt to connect The number of times of the continuous failure of function Access Gateway equipment.
Key generating unit 503, for after the number of times is more than default first threshold, generating new key.
Exemplary, if counting continuously failure 10 times of user equipment first accessing gateway equipment in statistic record unit 502, Default first threshold is 8 times, and so, the number of times of the continuous failure of user equipment first is more than default first threshold, then generate new Key 546213.
Authentication ' unit 504, the user equipment for not being pre-stored in gateway device to tagged word by the new key is carried out WIFI access authentications.
Exemplary, after Key generating unit 503 generates new key, MAC is not pre-stored in the user equipment of gateway device Second also connects gateway device after user equipment first, then the new key 546213 by generating carries out WIFI to user equipment second Access authentication, so, when attempting breaking cryptographic keys with gateway device connection is connected if illegitimate user equipment, gateway can be certainly Dynamic change key, to prevent key to be cracked.
The device of wireless access certification provided in an embodiment of the present invention, is not pre-stored in gateway device in judging characteristic word User equipment is more than after default first threshold with the number of times of gateway device connection failure, generates new key, and by the Xinmi City Key is not pre-stored in the user equipment of gateway device to tagged word and carries out the access authentication of WIFI, so, is generated with dynamic new The mode of key, it is therefore prevented that key is cracked.
Wherein, it is preferred that authentication ' unit 504, it is additionally operable to judge to attempt access to the user of gateway device in judging unit 501 After the tagged word of equipment is pre-stored in gateway device, the user equipment that this feature word is pre-stored in gateway device is entered by new key Row WIFI access authentications.
Exemplary, MAC is pre-stored in the user equipment third of gateway device and attempts to connect on gateway device, then close by original 123456 pairs of user equipmenies of key third carry out WIFI certification accesses, and certain user equipment third can also make after new key is obtained Accessed with new key 546213 and gateway device.
Further, normally set using the gateway to ensure that tagged word is not pre-stored in the user equipment of gateway device It is standby, as shown in fig. 6, the device 50 also includes:
Receiving unit 505, gateway device and success identity are pre-stored in for receiving by radio port from tagged word New key to the user equipment of WIFI access points checks message.
Sending module 506, for sending the new key to the user equipment.
Exemplary, when the user equipment third that above-mentioned MAC is pre-stored in gateway device passes through wirelessly to be connected with gateway device Afterwards, user equipment first attempts a connection to the gateway device, due to not knowing new key 546213 so being can not to pass through wirelessly to connect Enter on the gateway device, but, user equipment third can send the message for checking new key to the gateway device, treat this Receiving unit 505 is received by radio port and checks that after new key message, transmitting element 506 is new by this from user equipment third Further through user equipment third is wirelessly transmitted to, so, user equipment first can be obtained key 546213 by user equipment third After knowing new key, it is possible to by being wirelessly connected on the gateway device, so, both ensure that MAC was not pre-stored in net The user equipment of pass equipment normally uses the gateway device, and dynamic generates new key, it is therefore prevented that key is cracked.
Further, normally set using the gateway to ensure that tagged word is not pre-stored in the user equipment of gateway device It is standby, in the device 50,
Receiving unit 505, is additionally operable to check message by the new key of physical port receive user equipment.
Transmitting element 506, is additionally operable to send the new key to the user equipment.
Exemplary, upper user equipment first can also be directly connected on the physical port of gateway device, set to gateway Preparation is sent and checks new key message, after the receiving unit 505 receive physical port transmission check new key message after, send Unit 506 sends new key 546213 and gives user equipment first by physical port, and such user equipment first is after new key is obtained Just can be further through being wirelessly connected on gateway device, similarly, user equipment third not only can be by wirelessly checking Xinmi City Key 546213, can also be checked by being linked on the physical port of gateway device, so, also ensure that MAC not The user equipment for being pre-stored in gateway device normally uses the gateway device.
Preferably, it is pre-stored in after the user equipment of gateway device all used new key 546213 after tagged word, may be used also It is invalid so that original cipher key 123456 to be set to, so, more effectively prevent key to be cracked.
Preferably, in order to more effectively judge whether to need to change key, statistic record unit 502 is additionally operable to, and statistics is simultaneously The number of times of the continuous failure of record first user equipment accessing gateway equipment in default very first time thresholding.
Exemplary, it is 1 minute to preset the very first time thresholding, and the user that statistic record unit 502 is counted and recorded sets The number of times that standby first was connected in 1 minute with gateway device, if the number of times is more than default first threshold, generates new key, So, more effectively judged whether need to change key, so as to further prevent key to be cracked.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, all should contain Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by the scope of the claims.

Claims (9)

1. a kind of method of wireless access certification, it is characterised in that include:
It is not pre-stored in gateway device in the tagged word for judging first user equipment, and the first user equipment is first using close Key is attempted access to after gateway device failure, counts and record the secondary of the continuous failure of the first user equipment accessing gateway equipment Number;
If the number of times is more than default first threshold, new key is generated, and tagged word is not prestored by the new key WIFI access authentications are carried out in the user equipment of gateway device;
Wherein, after the generation new key, also include:
Gateway device is pre-stored in from tagged word by radio port reception and success identity sets to the user of WIFI access points Standby new key checks message;
The new key is sent to the user equipment.
2. the method for wireless access certification according to claim 1, it is characterised in that also include:
If judging, the tagged word of user equipment for attempting access to gateway device is pre-stored in gateway device, by original cipher key or The new key is pre-stored in the user equipment of gateway device to the tagged word and carries out WIFI access authentications.
3. the method for wireless access certification according to claim 1, it is characterised in that after the generation new key, also Including:
Message is checked by the new key of physical port receive user equipment;
The new key is sent to the user equipment.
4. the method for wireless access certification according to claim 1, it is characterised in that count and record the first user The number of times of the continuous failure of equipment accessing gateway equipment, including,
Count and record the secondary of the continuous failure of the first user equipment accessing gateway equipment in default very first time thresholding Number.
5. the method for the wireless access certification according to Claims 1 to 4 any one, it is characterised in that the tagged word For physical address (MAC), either organization unique identifier (OUI) either dispatches from the factory equipment Serial Number (SN) or IP address.
6. a kind of device of wireless access certification, it is characterised in that include:
Judging unit, for judging whether the tagged word of first user equipment is pre-stored in gateway device, and described first uses Whether family equipment attempts access to gateway device using key first successful;
Statistic record unit, counts and records the number of times of the continuous failure of the first user equipment accessing gateway equipment;
Key generating unit, for after the number of times is more than default first threshold, generating new key;
Authentication ' unit, the user equipment for not being pre-stored in gateway device to tagged word by the new key carries out WIFI accesses Certification;
Receiving unit, from tagged word gateway device is pre-stored in and success identity connects to WIFI for receiving by radio port The new key of the user equipment of access point checks message;
Transmitting element, for sending the new key to the user equipment.
7. the device of wireless access certification according to claim 6, it is characterised in that
Authentication ' unit, is additionally operable to judge that the tagged word of the user equipment for attempting access to gateway device is pre-stored in judging unit described After in gateway device, the user equipment that gateway device is pre-stored in the tagged word by the new key carries out WIFI accesses to be recognized Card.
8. the device of wireless access certification according to claim 6, it is characterised in that
The receiving unit, is additionally operable to check message by the new key of physical port receive user equipment;
The transmitting element, is additionally operable to send the new key to the user equipment.
9. the device of wireless access certification according to claim 6, it is characterised in that
The statistic record unit is specifically for counting and recording the first user equipment in default very first time thresholding The number of times of the continuous failure of accessing gateway equipment.
CN201210027511.3A 2012-02-08 2012-02-08 Method and device for wireless access authentication Expired - Fee Related CN103249040B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201210027511.3A CN103249040B (en) 2012-02-08 2012-02-08 Method and device for wireless access authentication
PCT/CN2013/070886 WO2013117131A1 (en) 2012-02-08 2013-01-23 Wireless access authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210027511.3A CN103249040B (en) 2012-02-08 2012-02-08 Method and device for wireless access authentication

Publications (2)

Publication Number Publication Date
CN103249040A CN103249040A (en) 2013-08-14
CN103249040B true CN103249040B (en) 2017-04-26

Family

ID=48928206

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210027511.3A Expired - Fee Related CN103249040B (en) 2012-02-08 2012-02-08 Method and device for wireless access authentication

Country Status (2)

Country Link
CN (1) CN103249040B (en)
WO (1) WO2013117131A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104093148A (en) * 2014-06-30 2014-10-08 广东九联科技股份有限公司 WIFI automatic connection authorization method based on Bluetooth
CN104333863B (en) * 2014-10-20 2018-11-30 小米科技有限责任公司 Connection management method and device, electronic equipment
US9913315B2 (en) 2014-10-20 2018-03-06 Xiaomi Inc. Method and device for connection management
CN106341815B (en) * 2015-07-17 2020-11-27 中兴通讯股份有限公司 Wireless connection method, terminal and AP
CN106454835A (en) * 2015-08-04 2017-02-22 中兴通讯股份有限公司 Wireless accessing method and apparatus
CN106686590A (en) * 2015-11-10 2017-05-17 中兴通讯股份有限公司 Controlled terminal identification method, controlled terminal management method, controlled terminal identification device, controlled terminal management device and wireless access point equipment
CN105516093B (en) * 2015-11-30 2018-10-12 上海斐讯数据通信技术有限公司 A kind of method and router of anti-loiter network
CN105451225B (en) * 2016-01-21 2020-02-21 上海斐讯数据通信技术有限公司 Access authentication method and access authentication equipment
CN105610866A (en) * 2016-02-18 2016-05-25 四川长虹电器股份有限公司 System and method for automatically accessing intelligent equipment to home wireless local area network

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068255A (en) * 2007-06-14 2007-11-07 杭州华三通信技术有限公司 User identification method and device in safety shell protocol application
CN101621800A (en) * 2009-08-13 2010-01-06 北京星谷科技有限公司 Method for exchanging authentication information between wireless terminal and wireless router
CN101662771A (en) * 2009-10-14 2010-03-03 中国电信股份有限公司 Method for realizing automatic certification of wireless access short message and system thereof
CN102204307A (en) * 2011-06-15 2011-09-28 华为技术有限公司 Wlan authentication method based on MAC address and device thereof

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101378582B (en) * 2007-08-29 2012-04-11 中国移动通信集团公司 User recognizing module, authentication center, authentication method and system
CN100589131C (en) * 2008-05-06 2010-02-10 北京握奇数据系统有限公司 Smart card containing Mifare functional module and data updating method thereof
CN101867912A (en) * 2010-06-07 2010-10-20 华为终端有限公司 Authentication method of access network and terminal
CN202014304U (en) * 2011-04-22 2011-10-19 深圳市隆宇世纪科技有限公司 Mobile phone privacy protection system based on code authentication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068255A (en) * 2007-06-14 2007-11-07 杭州华三通信技术有限公司 User identification method and device in safety shell protocol application
CN101621800A (en) * 2009-08-13 2010-01-06 北京星谷科技有限公司 Method for exchanging authentication information between wireless terminal and wireless router
CN101662771A (en) * 2009-10-14 2010-03-03 中国电信股份有限公司 Method for realizing automatic certification of wireless access short message and system thereof
CN102204307A (en) * 2011-06-15 2011-09-28 华为技术有限公司 Wlan authentication method based on MAC address and device thereof

Also Published As

Publication number Publication date
CN103249040A (en) 2013-08-14
WO2013117131A1 (en) 2013-08-15

Similar Documents

Publication Publication Date Title
CN103249040B (en) Method and device for wireless access authentication
CN102348209B (en) Method and device for wireless network access and authentication
CN103607712B (en) The cut-in method and device of wireless network
US8891502B2 (en) Apparatus and method for providing security of a network connection
KR20160114620A (en) Methods, devices and systems for dynamic network access administration
CN104683980A (en) Antitheft security management system and method for home wireless router
CN100574194C (en) A kind of method of safety management maintenance equipment and device
CN107769914A (en) Protect the method and the network equipment of data transmission security
CN101141259A (en) Method and device of access point equipment for preventing error access
CN101436934A (en) Method, system and equipment for controlling user upper wire
CN106488453A (en) A kind of method and system of portal certification
CN105392137A (en) Household WIFI embezzlement preventing method, wireless router and terminal equipment
CN101188498B (en) Communication terminal and communication method
CN101207475B (en) Method for preventing non-authorization linking of network system
CN101583154B (en) Communication method and device in wireless local area network
CN101945371A (en) Communication equipment and control method thereof
CN103312677B (en) Terminal, server and the method for building up of communication connection
CN107659999A (en) WIFI connection methods and equipment
CN101335647A (en) Family network access method and family network management system
CN107659935A (en) A kind of authentication method, certificate server, network management system and Verification System
CN110324330A (en) A kind of system and method for realizing internet and the transmission of public security intranet data
CN102571328A (en) Method and system for invoking service of user terminal, and user terminal
CN101540985B (en) Method for implementing terminal zero intervention charging of WAPI system
CN108449758A (en) A kind of binding method and system of Intelligent hardware
CN108966218A (en) A kind of wireless network access method and system based on management terminal control

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20180212

Address after: California, USA

Patentee after: Global innovation polymerization LLC

Address before: California, USA

Patentee before: Tanous Co.

Effective date of registration: 20180212

Address after: California, USA

Patentee after: Tanous Co.

Address before: 518129 Longgang District, Guangdong, Bantian HUAWEI base B District, building 2, building No.

Patentee before: HUAWEI DEVICE Co.,Ltd.

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170426

Termination date: 20220208

CF01 Termination of patent right due to non-payment of annual fee