CN105050089B - Wireless network login validation method and system - Google Patents
Wireless network login validation method and system Download PDFInfo
- Publication number
- CN105050089B CN105050089B CN201510519676.6A CN201510519676A CN105050089B CN 105050089 B CN105050089 B CN 105050089B CN 201510519676 A CN201510519676 A CN 201510519676A CN 105050089 B CN105050089 B CN 105050089B
- Authority
- CN
- China
- Prior art keywords
- wireless network
- social
- user
- claimant
- contact
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
Abstract
The present invention relates to a kind of wireless network login validation method and systems, social tool including user bound, store the contacts list of user social contact tool, when there is other people to request to log in, whether checking request people is in the contacts list of user social contact tool, wireless network is managed by the contacts list of user social contact tool, user is not needed and informs claimant's password, it is simple and convenient, the time is saved, is brought great convenience to user.Simultaneously as not needing to inform that claimant's password strengthens the safety and private ownership of wireless network to effectively prevent leaking for wireless network password.
Description
Technical field
The present invention relates to the communications field more particularly to a kind of wireless network login validation method and systems.
Background technique
With the development of wireless technology, demand of the mobile phone user to wireless telecommunications is also growing day by day, wireless network (such as
WIFI) as the highest short range wireless transmission technology of current cost performance just with the state coverage that rapidly increases to each of society
Corner.
Currently, the wireless network in family would generally use WPA etc. to add for the safety and private ownership that guarantee wireless network
Close mode is encrypted, and such verification mode user would generally input more complicated password (for safety).But family
In usually have that other people (friend or relatives) are visiting, other people generally require the wireless network in connection family, this is just needed
Wireless network name and password are informed other people, if other people quantity are more, to be informed repeatedly, often due to password
More complicated, this results in user's operation often and cumbersome, wastes the plenty of time, brings great inconvenience.
Summary of the invention
In view of this, it is necessary to for it is above-mentioned other people connect the problem that wireless network operations are cumbersome, bring very big inconvenience,
A kind of wireless network login validation method and system are provided.
The present invention provides a kind of wireless network login validation method, includes the following steps:
S10: the social tool account of wireless network and user are bound, and social tool account obtains wireless network
Administration authority, and the contacts list in user social contact tool account is obtained by wireless network and is stored, social tool account will
Contacts list is sent to wireless network after being encrypted and is stored, if user social contact tool account contacts list occurs more
Newly, then wireless network is sent to after being encrypted updated contacts list by social tool account to store;
S20: when there are other people to request to log in wireless network, prompt claimant's input in user social contact tool account
Contact identity information;
S30: the contacts list of the contact identity information of input and storage is compared by wireless network, judgement is asked
It whether in the contact list to ask for help, if allowing claimant to log in wireless network if, does not otherwise allow claimant to log in.
Preferably, the step S10 specifically: user inputs social tool account by the binding page, by wireless network
User social contact tool account is sent by verifying mail or identifying code verification mode, then by wireless network after user's checking success
It is bound with social tool account.
Preferably, the step S20 specifically: when wireless network receives the request of claimant, provided to claimant
Input interface prompts claimant to input contact identity information in user social contact tool account, after claimant's input with
The form of encryption is sent to wireless network.
The present invention also provides a kind of wireless network login authentication systems, comprising:
Social tool binding unit binds the social tool account of wireless network and user, social tool account
The administration authority of wireless network is obtained, and is obtained by wireless network and stored the contacts list in user social contact tool account,
Social tool account is sent to wireless network after being encrypted contacts list and stores, if user social contact tool account joins
It is that list updates, then is sent to wireless network after being encrypted updated contacts list by social tool account
It is stored;
Identity information input unit prompts claimant's input in user society when there is other people to request to log in wireless network
It hands over the contact identity information having in account;
Sign-On authentication unit, control by wireless network by the contact identity information of input and the contacts list of storage into
Whether in the contact list row comparison, judge claimant, if allowing claimant to log in wireless network if, otherwise do not allow to ask
It asks for help and logs in.
Preferably, user inputs social tool account by the binding page, and the social tool binding unit control is by nothing
Gauze network will verify mail or identifying code verification mode is sent to user social contact tool account, then by nothing after user's checking success
Gauze network and social tool account are bound.
Preferably, when wireless network receives the request of claimant, the identity information input unit is mentioned to claimant
For input interface, claimant is prompted to input the contact identity information in user social contact tool account, after claimant's input
It is sent to wireless network in an encrypted form.
Wireless network login validation method of the present invention and system, the social tool of user bound store user social contact tool
Contacts list, have other people request log in when checking request people whether in the contacts list of user social contact tool,
Wireless network is managed by the contacts list of user social contact tool, user is not needed and informs claimant's password, behaviour
Make simple and convenient, saves the time, bring great convenience to user.Simultaneously as not needing to inform claimant's password, to have
Effect prevents leaking for wireless network password, strengthens the safety and private ownership of wireless network.
Detailed description of the invention
Fig. 1 is the flow chart of the wireless network login validation method in one embodiment.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not
For limiting the present invention.
Fig. 1 is the flow chart of the wireless network login validation method in one embodiment, as shown in Figure 1, this method includes
Following steps:
S10: the social tool account of wireless network and user are bound, and is obtained by wireless network and stores user
Contacts list in social tool account.
Currently, with the application of various social tools (such as QQ, wechat, short message etc.), more and more users pass through
Social tool establishes connection and communication, and relative, colleague, friend etc. are added to the connection of social tool by social tool by user
In list, is contacted and communicated to facilitate.
In this embodiment, it is contemplated that preserve contact person in the application of social tool and social tool contacts list
Information, therefore the social tool account of wireless network and user are bound, while obtaining the contact person in social tool account
List obtains the contact information in user social contact tool account, logs in wireless network convenient for other people.
In further mode, the step specifically: user inputs social tool account by the binding page, by wireless
Network will verify the verification modes such as mail or identifying code and be sent to user social contact tool account, then by nothing after user's checking success
Gauze network and social tool account are bound, and social tool account obtains the administration authority of wireless network.
Meanwhile step further include: be sent to wireless network after being encrypted contacts list by social tool account
It is stored.If user social contact tool account contacts list updates, by social tool account by updated connection
List is sent to wireless network after being encrypted and is stored.
S20: when there are other people to request to log in wireless network, prompt claimant's input in user social contact tool account
Contact identity information.
It is bound by user social contact tool account and wireless network, after wireless network storing contact list, if having at this time
Other people request to log in wireless network, then prompt claimant, and claimant is prompted to input connection of the user in social tool
It is people's identity information, so that whether echo request people is in the contacts list of user social contact tool.
In further mode, the step specifically: when wireless network receives the request of claimant, to claimant
Input interface is provided, claimant is prompted to input the contact identity information in user social contact tool account, is inputted in claimant
It is sent to wireless network in an encrypted form afterwards.
S30: the contacts list of the contact identity information of input and storage is compared by wireless network, judgement is asked
It whether in the contact list to ask for help, if allowing claimant to log in wireless network if, does not otherwise allow claimant to log in.
After claimant inputs contact identity information, is compared, sentenced by wireless network and the contacts list of storage
In the contact list whether, if illustrating if, claimant is the contact person of user to disconnected claimant, and claimant is allowed to log in nothing
Gauze network, if not illustrating if, claimant is most likely not the contact person of user, and refusal logs in wireless network.In this way, passing through
The social tool of user bound stores the contacts list of user social contact tool, the checking request when there is other people to request to log in
People whether in the contacts list of user social contact tool, by the contacts list of user social contact tool come to wireless network into
Row management does not need user and informs claimant's password, simple and convenient, saves the time, brings great convenience to user.Together
When, due to not needing to inform that claimant's password strengthens the peace of wireless network to effectively prevent leaking for wireless network password
Full property and private ownership.
This method, the social tool of user bound store the contacts list of user social contact tool, are there is other people requests
Checking request people passes through the contacts list of user social contact tool whether in the contacts list of user social contact tool when logging in
Wireless network is managed, user is not needed and informs claimant password, it is simple and convenient, save the time, to user with
Carry out great convenience.Simultaneously as not needing to inform that claimant's password adds to effectively prevent leaking for wireless network password
The strong safety and private ownership of wireless network.
Meanwhile the present invention also provides a kind of wireless network login authentication system, which includes:
Social tool binding unit binds the social tool account of wireless network and user, and by wireless network
It obtains and stores the contacts list in user social contact tool account.
Currently, with the application of various social tools (such as QQ, wechat, short message etc.), more and more users pass through
Social tool establishes connection and communication, and relative, colleague, friend etc. are added to the connection of social tool by social tool by user
In list, is contacted and communicated to facilitate.
In this embodiment, it is contemplated that preserve contact person in the application of social tool and social tool contacts list
Information, therefore social tool binding unit binds the social tool account of wireless network and user, while obtaining social work
Have the contacts list in account, obtains the contact information in user social contact tool account, log in wireless network convenient for other people
Network.
In further mode, user inputs social tool account, social tool binding unit control by the binding page
System will verify the verification modes such as mail or identifying code by wireless network and be sent to user social contact tool account, user's checking success
Then wireless network and social tool account are bound afterwards, social tool account obtains the administration authority of wireless network.
Meanwhile social tool binding unit controls after being encrypted contacts list by social tool account and is sent to nothing
Gauze network is stored.If user social contact tool account contacts list updates, control will more by social tool account
Contacts list after new is sent to wireless network after being encrypted and is stored.
Identity information input unit prompts claimant's input in user society when there is other people to request to log in wireless network
It hands over the contact identity information having in account.
It is bound by user social contact tool account and wireless network, after wireless network storing contact list, if having at this time
Other people request to log in wireless network, and identity information input unit then prompts claimant, and claimant is prompted to input user
Contact identity information in social tool, so that whether echo request people is in the contacts list of user social contact tool.
In further mode, when wireless network receives the request of claimant, identity information input unit is to asking
It asks for help and input interface is provided, prompt claimant to input the contact identity information in user social contact tool account, in claimant
Wireless network is sent to after input in an encrypted form.
Sign-On authentication unit, control by wireless network by the contact identity information of input and the contacts list of storage into
Whether in the contact list row comparison, judge claimant, if allowing claimant to log in wireless network if, otherwise do not allow to ask
It asks for help and logs in.
After claimant inputs contact identity information, Sign-On authentication unit controls the contact person by wireless network and storage
List compares, and whether in the contact list to judge claimant, and if illustrating if, claimant is the contact person of user, permits
Perhaps claimant logs in wireless network, and if not illustrating if, claimant is most likely not the contact person of user, and refusal logs in wireless
Network.In this way, storing the contacts list of user social contact tool by the social tool of user bound, there is other people requests
Checking request people passes through the contacts list of user social contact tool whether in the contacts list of user social contact tool when logging in
Wireless network is managed, user is not needed and informs claimant password, it is simple and convenient, save the time, to user with
Carry out great convenience.Simultaneously as not needing to inform that claimant's password adds to effectively prevent leaking for wireless network password
The strong safety and private ownership of wireless network.
The wireless network login authentication system, the social tool of user bound, contact person's column of storage user social contact tool
Table, when there is other people to request to log in, checking request people passes through user society whether in the contacts list of user social contact tool
The contacts list of tool of handing over is managed wireless network, does not need user and informs claimant password, simple and convenient,
The time is saved, is brought great convenience to user.Simultaneously as not needing to inform claimant's password, to effectively prevent wireless
Network cipher leaks, and strengthens the safety and private ownership of wireless network.
Wireless network login validation method of the present invention and system, the social tool of user bound store user social contact tool
Contacts list, have other people request log in when checking request people whether in the contacts list of user social contact tool,
Wireless network is managed by the contacts list of user social contact tool, user is not needed and informs claimant's password, behaviour
Make simple and convenient, saves the time, bring great convenience to user.Simultaneously as not needing to inform claimant's password, to have
Effect prevents leaking for wireless network password, strengthens the safety and private ownership of wireless network.
The above is merely preferred embodiments of the present invention, be not intended to limit the invention, it is all in spirit of the invention and
Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within principle.
Claims (6)
1. a kind of wireless network login validation method, which comprises the steps of:
S10: the social tool account of wireless network and user are bound, and social tool account obtains the management of wireless network
Permission, and the contacts list in user social contact tool account is obtained by wireless network and is stored, social tool account will contact
List is sent to wireless network after being encrypted and is stored, if user social contact tool account contacts list updates,
Wireless network is sent to after then being encrypted updated contacts list by social tool account to store;
S20: when there are other people to request to log in wireless network, claimant is prompted to input the connection in user social contact tool account
People's identity information;
S30: the contacts list of the contact identity information of input and storage is compared by wireless network, judges claimant
Whether in the contact list, if allowing claimant to log in wireless network if, otherwise claimant is not allowed to log in.
2. wireless network login validation method according to claim 1, which is characterized in that the step S10 specifically: use
Family inputs social tool account by the binding page, will verify mail by wireless network or identifying code verification mode is sent to use
Family social tool account then binds wireless network and social tool account after user's checking success.
3. wireless network login validation method according to claim 2, which is characterized in that the step S20 specifically:
When wireless network receives the request of claimant, input interface is provided to claimant, prompts claimant's input in user social contact work
Have the contact identity information in account, is sent to wireless network in an encrypted form after claimant's input.
4. a kind of wireless network login authentication system characterized by comprising
Social tool binding unit binds the social tool account of wireless network and user, and social tool account obtains
The administration authority of wireless network, and the contacts list in user social contact tool account is obtained by wireless network and is stored, it is social
Tool account is sent to wireless network after being encrypted contacts list and stores, if user social contact tool account contact person
List updates, then wireless network progress is sent to after being encrypted updated contacts list by social tool account
Storage;
Identity information input unit prompts claimant's input in user social contact work when there is other people to request to log in wireless network
Has the contact identity information in account;
Sign-On authentication unit, control are carried out the contact identity information of input and the contacts list of storage pair by wireless network
Than whether in the contact list judging claimant, if allowing claimant to log in wireless network if, otherwise not allowing claimant
It logs in.
5. wireless network login authentication system according to claim 4, which is characterized in that user passes through binding page input
Social tool account, the social tool binding unit control will verify mail by wireless network or identifying code verification mode is sent out
It is sent to user social contact tool account, then binds wireless network and social tool account after user's checking success.
6. wireless network login authentication system according to claim 5, which is characterized in that receive request in wireless network
When the request of people, the identity information input unit provides input interface to claimant, prompts claimant's input in user social contact
Contact identity information in tool account is sent to wireless network after claimant's input in an encrypted form.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510519676.6A CN105050089B (en) | 2015-08-21 | 2015-08-21 | Wireless network login validation method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510519676.6A CN105050089B (en) | 2015-08-21 | 2015-08-21 | Wireless network login validation method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105050089A CN105050089A (en) | 2015-11-11 |
CN105050089B true CN105050089B (en) | 2019-04-02 |
Family
ID=54456190
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510519676.6A Expired - Fee Related CN105050089B (en) | 2015-08-21 | 2015-08-21 | Wireless network login validation method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105050089B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109462579A (en) * | 2018-10-22 | 2019-03-12 | 维沃移动通信有限公司 | A kind of auth method and terminal device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5898780A (en) * | 1996-05-21 | 1999-04-27 | Gric Communications, Inc. | Method and apparatus for authorizing remote internet access |
CN104104654A (en) * | 2013-04-07 | 2014-10-15 | 阿里巴巴集团控股有限公司 | Method and device for setting Wifi access authority and Wifi authentication |
CN104468565A (en) * | 2014-12-08 | 2015-03-25 | 农革 | WiFi hot spot login method and system |
CN104735052A (en) * | 2015-01-28 | 2015-06-24 | 中山大学 | WiFi hot spot safe login method and system |
-
2015
- 2015-08-21 CN CN201510519676.6A patent/CN105050089B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5898780A (en) * | 1996-05-21 | 1999-04-27 | Gric Communications, Inc. | Method and apparatus for authorizing remote internet access |
CN104104654A (en) * | 2013-04-07 | 2014-10-15 | 阿里巴巴集团控股有限公司 | Method and device for setting Wifi access authority and Wifi authentication |
CN104468565A (en) * | 2014-12-08 | 2015-03-25 | 农革 | WiFi hot spot login method and system |
CN104735052A (en) * | 2015-01-28 | 2015-06-24 | 中山大学 | WiFi hot spot safe login method and system |
Also Published As
Publication number | Publication date |
---|---|
CN105050089A (en) | 2015-11-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103959857B (en) | Manage the mobile device application in wireless network | |
US9178915B1 (en) | Cookie preservation when switching devices | |
CA2849763C (en) | Managing mobile device applications | |
CA2849757C (en) | Managing mobile device applications on a mobile device | |
US20170161721A1 (en) | Method and system for opening account based on euicc | |
CN110476447A (en) | The registration process of enhancing in the mobile system for supporting network slice | |
CN101578841B (en) | Authentication in communication networks | |
CA2882033C (en) | Data access method and device | |
US9426120B1 (en) | Location and time based mobile app policies | |
US20150181424A1 (en) | Mobile wireless access | |
CN103139182B (en) | A kind of method that user of permission accesses, client, server and system | |
CN104506561A (en) | Terminal data access control method and device | |
CN106060034A (en) | Account login method and device | |
WO2017076216A1 (en) | Server, mobile terminal, and internet real name authentication system and method | |
US8689303B1 (en) | Cookie-handling gateway | |
WO2017088548A1 (en) | Communication method based on social identity, and server | |
CN105681259A (en) | Open authorization method and apparatus and open platform | |
FI128171B (en) | Network authentication | |
CN103747433A (en) | Method and mobile terminal for realizing root request management through manufacturer server | |
CN104378385B (en) | A kind of auth method and device | |
CN102567903B (en) | A kind of Web applications subscribe method, Apparatus and system | |
CN113326488A (en) | Personal information protection system and method | |
US20140331295A1 (en) | Credential management gateway and method | |
CN104811927A (en) | Information processing method, terminal and server and communication method and system | |
US20140366152A1 (en) | Secure data transmission |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190402 Termination date: 20210821 |
|
CF01 | Termination of patent right due to non-payment of annual fee |