CN105050089B - Wireless network login validation method and system - Google Patents

Wireless network login validation method and system Download PDF

Info

Publication number
CN105050089B
CN105050089B CN201510519676.6A CN201510519676A CN105050089B CN 105050089 B CN105050089 B CN 105050089B CN 201510519676 A CN201510519676 A CN 201510519676A CN 105050089 B CN105050089 B CN 105050089B
Authority
CN
China
Prior art keywords
wireless network
social
user
claimant
contact
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510519676.6A
Other languages
Chinese (zh)
Other versions
CN105050089A (en
Inventor
林白鹭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jiuzhou Electric Appliance Co Ltd
Original Assignee
Shenzhen Jiuzhou Electric Appliance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jiuzhou Electric Appliance Co Ltd filed Critical Shenzhen Jiuzhou Electric Appliance Co Ltd
Priority to CN201510519676.6A priority Critical patent/CN105050089B/en
Publication of CN105050089A publication Critical patent/CN105050089A/en
Application granted granted Critical
Publication of CN105050089B publication Critical patent/CN105050089B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]

Abstract

The present invention relates to a kind of wireless network login validation method and systems, social tool including user bound, store the contacts list of user social contact tool, when there is other people to request to log in, whether checking request people is in the contacts list of user social contact tool, wireless network is managed by the contacts list of user social contact tool, user is not needed and informs claimant's password, it is simple and convenient, the time is saved, is brought great convenience to user.Simultaneously as not needing to inform that claimant's password strengthens the safety and private ownership of wireless network to effectively prevent leaking for wireless network password.

Description

Wireless network login validation method and system
Technical field
The present invention relates to the communications field more particularly to a kind of wireless network login validation method and systems.
Background technique
With the development of wireless technology, demand of the mobile phone user to wireless telecommunications is also growing day by day, wireless network (such as WIFI) as the highest short range wireless transmission technology of current cost performance just with the state coverage that rapidly increases to each of society Corner.
Currently, the wireless network in family would generally use WPA etc. to add for the safety and private ownership that guarantee wireless network Close mode is encrypted, and such verification mode user would generally input more complicated password (for safety).But family In usually have that other people (friend or relatives) are visiting, other people generally require the wireless network in connection family, this is just needed Wireless network name and password are informed other people, if other people quantity are more, to be informed repeatedly, often due to password More complicated, this results in user's operation often and cumbersome, wastes the plenty of time, brings great inconvenience.
Summary of the invention
In view of this, it is necessary to for it is above-mentioned other people connect the problem that wireless network operations are cumbersome, bring very big inconvenience, A kind of wireless network login validation method and system are provided.
The present invention provides a kind of wireless network login validation method, includes the following steps:
S10: the social tool account of wireless network and user are bound, and social tool account obtains wireless network Administration authority, and the contacts list in user social contact tool account is obtained by wireless network and is stored, social tool account will Contacts list is sent to wireless network after being encrypted and is stored, if user social contact tool account contacts list occurs more Newly, then wireless network is sent to after being encrypted updated contacts list by social tool account to store;
S20: when there are other people to request to log in wireless network, prompt claimant's input in user social contact tool account Contact identity information;
S30: the contacts list of the contact identity information of input and storage is compared by wireless network, judgement is asked It whether in the contact list to ask for help, if allowing claimant to log in wireless network if, does not otherwise allow claimant to log in.
Preferably, the step S10 specifically: user inputs social tool account by the binding page, by wireless network User social contact tool account is sent by verifying mail or identifying code verification mode, then by wireless network after user's checking success It is bound with social tool account.
Preferably, the step S20 specifically: when wireless network receives the request of claimant, provided to claimant Input interface prompts claimant to input contact identity information in user social contact tool account, after claimant's input with The form of encryption is sent to wireless network.
The present invention also provides a kind of wireless network login authentication systems, comprising:
Social tool binding unit binds the social tool account of wireless network and user, social tool account The administration authority of wireless network is obtained, and is obtained by wireless network and stored the contacts list in user social contact tool account, Social tool account is sent to wireless network after being encrypted contacts list and stores, if user social contact tool account joins It is that list updates, then is sent to wireless network after being encrypted updated contacts list by social tool account It is stored;
Identity information input unit prompts claimant's input in user society when there is other people to request to log in wireless network It hands over the contact identity information having in account;
Sign-On authentication unit, control by wireless network by the contact identity information of input and the contacts list of storage into Whether in the contact list row comparison, judge claimant, if allowing claimant to log in wireless network if, otherwise do not allow to ask It asks for help and logs in.
Preferably, user inputs social tool account by the binding page, and the social tool binding unit control is by nothing Gauze network will verify mail or identifying code verification mode is sent to user social contact tool account, then by nothing after user's checking success Gauze network and social tool account are bound.
Preferably, when wireless network receives the request of claimant, the identity information input unit is mentioned to claimant For input interface, claimant is prompted to input the contact identity information in user social contact tool account, after claimant's input It is sent to wireless network in an encrypted form.
Wireless network login validation method of the present invention and system, the social tool of user bound store user social contact tool Contacts list, have other people request log in when checking request people whether in the contacts list of user social contact tool, Wireless network is managed by the contacts list of user social contact tool, user is not needed and informs claimant's password, behaviour Make simple and convenient, saves the time, bring great convenience to user.Simultaneously as not needing to inform claimant's password, to have Effect prevents leaking for wireless network password, strengthens the safety and private ownership of wireless network.
Detailed description of the invention
Fig. 1 is the flow chart of the wireless network login validation method in one embodiment.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention.
Fig. 1 is the flow chart of the wireless network login validation method in one embodiment, as shown in Figure 1, this method includes Following steps:
S10: the social tool account of wireless network and user are bound, and is obtained by wireless network and stores user Contacts list in social tool account.
Currently, with the application of various social tools (such as QQ, wechat, short message etc.), more and more users pass through Social tool establishes connection and communication, and relative, colleague, friend etc. are added to the connection of social tool by social tool by user In list, is contacted and communicated to facilitate.
In this embodiment, it is contemplated that preserve contact person in the application of social tool and social tool contacts list Information, therefore the social tool account of wireless network and user are bound, while obtaining the contact person in social tool account List obtains the contact information in user social contact tool account, logs in wireless network convenient for other people.
In further mode, the step specifically: user inputs social tool account by the binding page, by wireless Network will verify the verification modes such as mail or identifying code and be sent to user social contact tool account, then by nothing after user's checking success Gauze network and social tool account are bound, and social tool account obtains the administration authority of wireless network.
Meanwhile step further include: be sent to wireless network after being encrypted contacts list by social tool account It is stored.If user social contact tool account contacts list updates, by social tool account by updated connection List is sent to wireless network after being encrypted and is stored.
S20: when there are other people to request to log in wireless network, prompt claimant's input in user social contact tool account Contact identity information.
It is bound by user social contact tool account and wireless network, after wireless network storing contact list, if having at this time Other people request to log in wireless network, then prompt claimant, and claimant is prompted to input connection of the user in social tool It is people's identity information, so that whether echo request people is in the contacts list of user social contact tool.
In further mode, the step specifically: when wireless network receives the request of claimant, to claimant Input interface is provided, claimant is prompted to input the contact identity information in user social contact tool account, is inputted in claimant It is sent to wireless network in an encrypted form afterwards.
S30: the contacts list of the contact identity information of input and storage is compared by wireless network, judgement is asked It whether in the contact list to ask for help, if allowing claimant to log in wireless network if, does not otherwise allow claimant to log in.
After claimant inputs contact identity information, is compared, sentenced by wireless network and the contacts list of storage In the contact list whether, if illustrating if, claimant is the contact person of user to disconnected claimant, and claimant is allowed to log in nothing Gauze network, if not illustrating if, claimant is most likely not the contact person of user, and refusal logs in wireless network.In this way, passing through The social tool of user bound stores the contacts list of user social contact tool, the checking request when there is other people to request to log in People whether in the contacts list of user social contact tool, by the contacts list of user social contact tool come to wireless network into Row management does not need user and informs claimant's password, simple and convenient, saves the time, brings great convenience to user.Together When, due to not needing to inform that claimant's password strengthens the peace of wireless network to effectively prevent leaking for wireless network password Full property and private ownership.
This method, the social tool of user bound store the contacts list of user social contact tool, are there is other people requests Checking request people passes through the contacts list of user social contact tool whether in the contacts list of user social contact tool when logging in Wireless network is managed, user is not needed and informs claimant password, it is simple and convenient, save the time, to user with Carry out great convenience.Simultaneously as not needing to inform that claimant's password adds to effectively prevent leaking for wireless network password The strong safety and private ownership of wireless network.
Meanwhile the present invention also provides a kind of wireless network login authentication system, which includes:
Social tool binding unit binds the social tool account of wireless network and user, and by wireless network It obtains and stores the contacts list in user social contact tool account.
Currently, with the application of various social tools (such as QQ, wechat, short message etc.), more and more users pass through Social tool establishes connection and communication, and relative, colleague, friend etc. are added to the connection of social tool by social tool by user In list, is contacted and communicated to facilitate.
In this embodiment, it is contemplated that preserve contact person in the application of social tool and social tool contacts list Information, therefore social tool binding unit binds the social tool account of wireless network and user, while obtaining social work Have the contacts list in account, obtains the contact information in user social contact tool account, log in wireless network convenient for other people Network.
In further mode, user inputs social tool account, social tool binding unit control by the binding page System will verify the verification modes such as mail or identifying code by wireless network and be sent to user social contact tool account, user's checking success Then wireless network and social tool account are bound afterwards, social tool account obtains the administration authority of wireless network.
Meanwhile social tool binding unit controls after being encrypted contacts list by social tool account and is sent to nothing Gauze network is stored.If user social contact tool account contacts list updates, control will more by social tool account Contacts list after new is sent to wireless network after being encrypted and is stored.
Identity information input unit prompts claimant's input in user society when there is other people to request to log in wireless network It hands over the contact identity information having in account.
It is bound by user social contact tool account and wireless network, after wireless network storing contact list, if having at this time Other people request to log in wireless network, and identity information input unit then prompts claimant, and claimant is prompted to input user Contact identity information in social tool, so that whether echo request people is in the contacts list of user social contact tool.
In further mode, when wireless network receives the request of claimant, identity information input unit is to asking It asks for help and input interface is provided, prompt claimant to input the contact identity information in user social contact tool account, in claimant Wireless network is sent to after input in an encrypted form.
Sign-On authentication unit, control by wireless network by the contact identity information of input and the contacts list of storage into Whether in the contact list row comparison, judge claimant, if allowing claimant to log in wireless network if, otherwise do not allow to ask It asks for help and logs in.
After claimant inputs contact identity information, Sign-On authentication unit controls the contact person by wireless network and storage List compares, and whether in the contact list to judge claimant, and if illustrating if, claimant is the contact person of user, permits Perhaps claimant logs in wireless network, and if not illustrating if, claimant is most likely not the contact person of user, and refusal logs in wireless Network.In this way, storing the contacts list of user social contact tool by the social tool of user bound, there is other people requests Checking request people passes through the contacts list of user social contact tool whether in the contacts list of user social contact tool when logging in Wireless network is managed, user is not needed and informs claimant password, it is simple and convenient, save the time, to user with Carry out great convenience.Simultaneously as not needing to inform that claimant's password adds to effectively prevent leaking for wireless network password The strong safety and private ownership of wireless network.
The wireless network login authentication system, the social tool of user bound, contact person's column of storage user social contact tool Table, when there is other people to request to log in, checking request people passes through user society whether in the contacts list of user social contact tool The contacts list of tool of handing over is managed wireless network, does not need user and informs claimant password, simple and convenient, The time is saved, is brought great convenience to user.Simultaneously as not needing to inform claimant's password, to effectively prevent wireless Network cipher leaks, and strengthens the safety and private ownership of wireless network.
Wireless network login validation method of the present invention and system, the social tool of user bound store user social contact tool Contacts list, have other people request log in when checking request people whether in the contacts list of user social contact tool, Wireless network is managed by the contacts list of user social contact tool, user is not needed and informs claimant's password, behaviour Make simple and convenient, saves the time, bring great convenience to user.Simultaneously as not needing to inform claimant's password, to have Effect prevents leaking for wireless network password, strengthens the safety and private ownership of wireless network.
The above is merely preferred embodiments of the present invention, be not intended to limit the invention, it is all in spirit of the invention and Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within principle.

Claims (6)

1. a kind of wireless network login validation method, which comprises the steps of:
S10: the social tool account of wireless network and user are bound, and social tool account obtains the management of wireless network Permission, and the contacts list in user social contact tool account is obtained by wireless network and is stored, social tool account will contact List is sent to wireless network after being encrypted and is stored, if user social contact tool account contacts list updates, Wireless network is sent to after then being encrypted updated contacts list by social tool account to store;
S20: when there are other people to request to log in wireless network, claimant is prompted to input the connection in user social contact tool account People's identity information;
S30: the contacts list of the contact identity information of input and storage is compared by wireless network, judges claimant Whether in the contact list, if allowing claimant to log in wireless network if, otherwise claimant is not allowed to log in.
2. wireless network login validation method according to claim 1, which is characterized in that the step S10 specifically: use Family inputs social tool account by the binding page, will verify mail by wireless network or identifying code verification mode is sent to use Family social tool account then binds wireless network and social tool account after user's checking success.
3. wireless network login validation method according to claim 2, which is characterized in that the step S20 specifically: When wireless network receives the request of claimant, input interface is provided to claimant, prompts claimant's input in user social contact work Have the contact identity information in account, is sent to wireless network in an encrypted form after claimant's input.
4. a kind of wireless network login authentication system characterized by comprising
Social tool binding unit binds the social tool account of wireless network and user, and social tool account obtains The administration authority of wireless network, and the contacts list in user social contact tool account is obtained by wireless network and is stored, it is social Tool account is sent to wireless network after being encrypted contacts list and stores, if user social contact tool account contact person List updates, then wireless network progress is sent to after being encrypted updated contacts list by social tool account Storage;
Identity information input unit prompts claimant's input in user social contact work when there is other people to request to log in wireless network Has the contact identity information in account;
Sign-On authentication unit, control are carried out the contact identity information of input and the contacts list of storage pair by wireless network Than whether in the contact list judging claimant, if allowing claimant to log in wireless network if, otherwise not allowing claimant It logs in.
5. wireless network login authentication system according to claim 4, which is characterized in that user passes through binding page input Social tool account, the social tool binding unit control will verify mail by wireless network or identifying code verification mode is sent out It is sent to user social contact tool account, then binds wireless network and social tool account after user's checking success.
6. wireless network login authentication system according to claim 5, which is characterized in that receive request in wireless network When the request of people, the identity information input unit provides input interface to claimant, prompts claimant's input in user social contact Contact identity information in tool account is sent to wireless network after claimant's input in an encrypted form.
CN201510519676.6A 2015-08-21 2015-08-21 Wireless network login validation method and system Expired - Fee Related CN105050089B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510519676.6A CN105050089B (en) 2015-08-21 2015-08-21 Wireless network login validation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510519676.6A CN105050089B (en) 2015-08-21 2015-08-21 Wireless network login validation method and system

Publications (2)

Publication Number Publication Date
CN105050089A CN105050089A (en) 2015-11-11
CN105050089B true CN105050089B (en) 2019-04-02

Family

ID=54456190

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510519676.6A Expired - Fee Related CN105050089B (en) 2015-08-21 2015-08-21 Wireless network login validation method and system

Country Status (1)

Country Link
CN (1) CN105050089B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109462579A (en) * 2018-10-22 2019-03-12 维沃移动通信有限公司 A kind of auth method and terminal device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5898780A (en) * 1996-05-21 1999-04-27 Gric Communications, Inc. Method and apparatus for authorizing remote internet access
CN104104654A (en) * 2013-04-07 2014-10-15 阿里巴巴集团控股有限公司 Method and device for setting Wifi access authority and Wifi authentication
CN104468565A (en) * 2014-12-08 2015-03-25 农革 WiFi hot spot login method and system
CN104735052A (en) * 2015-01-28 2015-06-24 中山大学 WiFi hot spot safe login method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5898780A (en) * 1996-05-21 1999-04-27 Gric Communications, Inc. Method and apparatus for authorizing remote internet access
CN104104654A (en) * 2013-04-07 2014-10-15 阿里巴巴集团控股有限公司 Method and device for setting Wifi access authority and Wifi authentication
CN104468565A (en) * 2014-12-08 2015-03-25 农革 WiFi hot spot login method and system
CN104735052A (en) * 2015-01-28 2015-06-24 中山大学 WiFi hot spot safe login method and system

Also Published As

Publication number Publication date
CN105050089A (en) 2015-11-11

Similar Documents

Publication Publication Date Title
CN103959857B (en) Manage the mobile device application in wireless network
US9178915B1 (en) Cookie preservation when switching devices
CA2849763C (en) Managing mobile device applications
CA2849757C (en) Managing mobile device applications on a mobile device
US20170161721A1 (en) Method and system for opening account based on euicc
CN110476447A (en) The registration process of enhancing in the mobile system for supporting network slice
CN101578841B (en) Authentication in communication networks
CA2882033C (en) Data access method and device
US9426120B1 (en) Location and time based mobile app policies
US20150181424A1 (en) Mobile wireless access
CN103139182B (en) A kind of method that user of permission accesses, client, server and system
CN104506561A (en) Terminal data access control method and device
CN106060034A (en) Account login method and device
WO2017076216A1 (en) Server, mobile terminal, and internet real name authentication system and method
US8689303B1 (en) Cookie-handling gateway
WO2017088548A1 (en) Communication method based on social identity, and server
CN105681259A (en) Open authorization method and apparatus and open platform
FI128171B (en) Network authentication
CN103747433A (en) Method and mobile terminal for realizing root request management through manufacturer server
CN104378385B (en) A kind of auth method and device
CN102567903B (en) A kind of Web applications subscribe method, Apparatus and system
CN113326488A (en) Personal information protection system and method
US20140331295A1 (en) Credential management gateway and method
CN104811927A (en) Information processing method, terminal and server and communication method and system
US20140366152A1 (en) Secure data transmission

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190402

Termination date: 20210821

CF01 Termination of patent right due to non-payment of annual fee