CN105847058A - Wireless password setting method and device - Google Patents
Wireless password setting method and device Download PDFInfo
- Publication number
- CN105847058A CN105847058A CN201610197206.7A CN201610197206A CN105847058A CN 105847058 A CN105847058 A CN 105847058A CN 201610197206 A CN201610197206 A CN 201610197206A CN 105847058 A CN105847058 A CN 105847058A
- Authority
- CN
- China
- Prior art keywords
- password
- wireless
- temporary login
- login password
- network equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/067—Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a wireless password setting method and device, applied to a network device for emitting WiFi signals; the network device is internally provided with a first wireless login password in advance, which is used for wirelessly connecting with the network device. The method comprises: when receiving a password setting instruction, obtaining a temporary login password different from the first wireless login password; and in a preset time quantum, determining the temporary login password to be a second wireless login password for wirelessly connecting with the network device, the temporary login password being invalid out of the preset time quantum. The technical scheme determines the temporary login password to be a second wireless login password for wirelessly connecting with the network device in a preset time quantum, and the temporary login password loses efficacy out of the preset time quantum; accordingly, through notifying a visitor of the second wireless login password, the visitor and the people told of a wireless login password by the visitor can not steal WiFi network resources.
Description
Technical field
The present invention relates to network communication technology field, particularly to a kind of wireless cipher method to set up and device.
Background technology
Wireless network (WIreless-FIdelity, WiFi) technology is a kind of particularly convenient data transmission technology.Specifically
Ground, the network equipment (can be the electronic equipments such as router, switch, PC) of connected with network cable to emission without
Line electric wave forms the WiFi signal of certain area, makes the user terminal being positioned at wifi coverage can pass through wireless
Mode realizes online.Owing to erection expense and the complexity of WiFi network are all far below traditional cable network, and allow
It is positioned at the employing of the subscriber equipment in the range of WiFi and wirelessly connects network, so WiFi network answering in the world today
With widely.But, owing to WiFi network allows all subscriber equipmenies being positioned at its coverage to utilize its network to provide
Source networks, and so how ensures that the Internet resources of WiFi network are not stolen and have the strongest necessity.
In correlation technique, it is adopted as WiFi network and the mode of wireless entry password is set prevents oneself Internet resources stolen
With, only the Internet resources of corresponding WiFi network can be utilized to get online without being tethered to a cable by the subscriber equipment of cipher authentication.
But, in actual use, WiFi network manager would generally be asked for wireless entry password by visitor, and visitor is obtaining
After knowing wireless entry password, as long as wireless entry password is not modified by WiFi network manager, visitor at any time can be in order to
Connect WiFi network with its wireless entry password known, and the common wish of WiFi network manager is to allow visitor to exist
Connecting WiFi network in the specific time period, these Internet resources that will result in WiFi network are stolen, it addition, visitor exists
After knowing wireless entry password, it is possible to tell more people by wireless entry password, this will further result in WiFi network
Internet resources be stolen.So, the technical scheme of correlation technique cannot be avoided visitor and be informed wireless entry by visitor
The Internet resources of people's steal WiFi network of password.
Summary of the invention
The embodiment of the present invention provides a kind of wireless cipher method to set up and device, to avoid visitor and to be informed by visitor
The Internet resources of people's steal WiFi network of wireless entry password.
In order to solve above-mentioned technical problem, the embodiment of the invention discloses following technical scheme:
A kind of wireless cipher method to set up, is applied to launch the network equipment of WiFi signal, in the described network equipment in advance
Being provided with the first wireless entry password, described first wireless entry password is for the network equipment described in wireless connections, described side
Method includes:
When receiving password and arranging instruction, obtain the temporary login password different from described first wireless entry password;
Described temporary login password is defined as in preset time period second of the network equipment described in wireless connections wireless step on
Record password, described temporary login password lost efficacy outside described preset time period.
Preferably, described acquisition temporary login password, including:
Judge described password to arrange in instruction whether to carry user to input password;
When described password arrange instruction carries user input password time, described user is inputted password be defined as described in face
Time login password;
When described password arrange instruction is not carried user input password time, utilize preset algorithm generate described temporary login
Password.
Preferably, also include:
Export described temporary login password.
Preferably, described output described temporary login password, including:
The display interface of the described network equipment shows described temporary login password, and/or, by close for described temporary login
Code is sent to preset terminal unit.
Preferably, described password arranges and carries set of time information in instruction, also includes:
Described preset time period is determined according to described set of time information.
Preferably, also include:
Receive the instruction deleting described second wireless entry password;
Delete the setting of described second wireless entry password in the described network equipment.
A kind of wireless cipher arranges device, is applied to launch the network equipment of WiFi signal, in the described network equipment in advance
Being provided with the first wireless entry password, described first wireless entry password is for the network equipment described in wireless connections, described dress
Put and include:
Password acquiring unit, for when receiving password and arranging instruction, obtains different from described first wireless entry password
Temporary login password;
Password determines unit, for described temporary login password being defined as network described in wireless connections in preset time period
Second wireless entry password of equipment, described temporary login password lost efficacy outside described preset time period.
Preferably, described password acquiring unit, including:
Judgment sub-unit, is used for judging described password to arrange in instruction and whether carries user inputting password;
Password determines subelement, for when described password arrange instruction carries user input password time, by described user
Input password is defined as described temporary login password;
Password generate subelement, for when described password arrange instruction is not carried user input password time, utilize preset
Algorithm generates described temporary login password.
Preferably, also include:
Output unit, is used for exporting described temporary login password.
Preferably, described output unit, including: display subelement, and/or send subelement;
Described display subelement, for showing described temporary login password on the display interface of the described network equipment;
Described transmission subelement, for being sent to default terminal unit by described temporary login password.
Preferably, described password arranges and carries set of time information in instruction, also includes:
Preset time period determines unit, for determining described preset time period according to described set of time information.
Preferably, also include:
Instruction reception unit, for receiving the instruction deleting described second wireless entry password;
Delete unit, for deleting the setting of the described second wireless entry password in the described network equipment.
The technical scheme that embodiments of the invention provide can include following beneficial effect:
A kind of wireless cipher method to set up of embodiment of the present invention offer and device, when the network equipment launching WiFi signal
Receive password time instruction is set, obtain temporary login password, and by true for described temporary login password in preset time period
Being set to the second wireless entry password of the network equipment described in wireless connections, described temporary login password is in described preset time period
Outer inefficacy, wherein, is previously provided with the first wireless entry password, described first wireless entry password in the described network equipment
For the network equipment described in wireless connections.
When applying the scheme of the embodiment of the present invention, owing to described temporary login password being defined as nothing in preset time period
Line connects the second wireless entry password of the described network equipment, and described temporary login password lost efficacy outside described preset time period.
So when actually used, the second wireless entry password only can be informed visitor by WiFi network manager so that visitor is only
WiFi network can be used in preset time period, even and if visitor the second wireless entry password is informed more people, due to
Second wireless entry password is interim, and the people informed can not use WiFi network, therefore compared with correlation technique,
Technical scheme is it can be avoided that visitor and informed the net of people's steal WiFi network of wireless entry password by visitor
Network resource.
It should be appreciated that it is only exemplary and explanatory that above general description and details hereinafter describe, can not
Limit the disclosure.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
In technology description, the required accompanying drawing used is briefly described, it should be apparent that, for those of ordinary skill in the art
Speech, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
The flow chart of a kind of wireless cipher method to set up that Fig. 1 provides for the embodiment of the present invention;
The flow chart of the another kind of wireless cipher method to set up that Fig. 2 provides for the embodiment of the present invention;
Fig. 3 arranges the structural representation of device for a kind of wireless cipher that the embodiment of the present invention provides;
Fig. 4 arranges the structural representation of device for the another kind of wireless cipher that the embodiment of the present invention provides.
Detailed description of the invention
Below embodiment of the present invention provides a kind of wireless cipher method to set up and device, to avoid visitor and to be accused by visitor
Know the Internet resources of people's steal WiFi network of wireless entry password.
For the technical scheme making those skilled in the art be more fully understood that in the embodiment of the present invention, and the present invention is made to implement
The above-mentioned purpose of example, feature and advantage can become apparent from understandable, below in conjunction with the accompanying drawings to technical side in the embodiment of the present invention
Case is described in further detail.
As it is shown in figure 1, the flow chart of a kind of wireless cipher method to set up provided for the embodiment of the present invention, it is applied to launch
The network equipment of WiFi signal, is previously provided with the first wireless entry password in the described network equipment, described first wireless steps on
Record password is for the network equipment described in wireless connections.Wherein, described first wireless entry password is equivalent in correlation technique
Wireless entry password, its set-up mode is identical with the mode arranging wireless entry password in correlation technique, repeats no more here.
This wireless cipher method to set up may comprise steps of:
In step S101, when receiving password and arranging instruction, obtain different from described first wireless entry password
Temporary login password.
In this step, the network equipment launching WiFi signal detects whether that receiving password arranges instruction, is receiving
When password arranges instruction, obtain the temporary login password different from described first wireless entry password.Wherein, described network
Equipment can be the electronic equipments such as router, wireless exchange board, computer.The described network equipment receives password and arranges instruction
Mode can have multiple, and such as, the WiFi network that the described network equipment can receive the described network equipment and be provided covers model
The password of the terminal unit transmission in enclosing with WiFi administration authority arranges instruction, it is also possible to receives user and is clicking on described net
The password that after pre-set button on network equipment, the described network equipment sends arranges instruction etc., has the end of WiFi administration authority
The password that end equipment sends arranges instruction and can send after user performs predetermined registration operation on this terminal unit, such as, and can
Send during to click on the WiFi password settings button on the default APP installed on this terminal unit user.It addition, at this
During invention is embodied as, the mode obtaining the temporary login password different from described first wireless entry password also may be used
Multiple to have.
Such as, in a kind of detailed description of the invention of the present invention, described acquisition is different from described first wireless entry password
The step of temporary login password may include that
Judge described password to arrange in instruction whether to carry user to input password;
When described password arrange instruction carries user input password time, described user is inputted password be defined as described in face
Time login password;
When described password arrange instruction is not carried user input password time, utilize preset algorithm generate described temporary login
Password.
Specifically, when described password arrange instruction carries user input password time, described user inputs the source of password
There is in the WiFi network coverage that can be user be provided by the described network equipment terminal of WiFi administration authority
Equipment input, it is then sent to the described network equipment, it is also possible to be that user is by the input arranged on the described network equipment
Button carries out inputting.Obtaining after described user inputs password, generating and carry user and input the password of password finger is set
Order, then arranges from corresponding password and extracts described user instruction and input password, and described user is inputted password determines
For described temporary login password.Here it is different from described first wireless entry password that user inputs password.When described password
Arrange and instruction do not carries user when inputting password, utilize preset algorithm to generate described temporary login password.Such as, may be used
To utilize common Generating Random Number to generate described temporary login password, it is also possible to according to the rule (example being manually set
As, setting is for the first time described temporary login password with " 123456 ", and second time is described to step on " 234561 " temporarily
Record password, the like) generate described temporary login password etc..
Obviously, this detailed description of the invention is only a kind of concrete mode obtaining temporary login password, specifically real in the present invention
During executing, there is also other modes obtaining temporary login password, such as, can pre-build that one comprises multiple close
The list of code, when receiving password and arranging instruction, directly from list, one password of random extraction is close as temporary login
Code.The most such as, when receiving password and arranging instruction, can directly utilize and face described in common Generating Random Number generation
Time login password.The mode obtaining temporary login password is not limited by the present invention.
In step s 102, in preset time period, described temporary login password is defined as network described in wireless connections to set
The second standby wireless entry password, described temporary login password lost efficacy outside described preset time period.
In this step, in preset time period, the temporary login password obtained in step S101 is defined as wireless connections
Second wireless entry password of the described network equipment, and described temporary login password lost efficacy outside described preset time period.Tool
Body ground, can be by revising the program of wireless authentication in the described network equipment so that wireless authentication program is in preset time period
Support the first wireless entry password and the certification of the second wireless entry password simultaneously.And then make visitor at owner (i.e. WiFi
Network manager) inform its second wireless entry password after, visitor can utilize described second nothing in described preset time period
The corresponding WiFi network of line login password wireless connections is surfed the Net, and can not utilize described second outside described preset time period
The corresponding WiFi network of wireless entry password wireless connections is surfed the Net, and informs the people of the first wireless entry password (such as
Household, interior employee etc.) the described first wireless entry corresponding WiFi of password wireless connections can be utilized at any time
Network is surfed the Net.Even if described second wireless entry password is informed other people after leaving host or unit by visitor, institute
It is interim for stating the second wireless entry password, so also can prevent visitor from informing the wireless company of people of the second wireless entry password
Connect corresponding WiFi network to surf the Net.Wherein, the length of described preset time period can be 1 hour, 2 hours, 1
It etc., the length of described preset time period can be the pre-set set time, it is also possible to is that owner sets as required
Fixed, such as, in a kind of detailed description of the invention of the present invention, owner can pass through the described network equipment or described network
The terminal unit in the WiFi network coverage that equipment is provided with WiFi administration authority pre-enters set of time letter
Breath, and this set of time information is placed on password arrange instruction is sent to the described network equipment (can also be by set of time
Information and password arrange instruction and separately send), the most described network equipment determines described presetting according to described set of time information
Time period.Such as, owner arrange set of time information be 8 a.m. to 12 points, the most described preset time period is corresponding
Time is also 8 o'clock to 12 o'clock, and the most such as, the set of time information that owner is arranged is 4 hours, and connects phase from visitor
The WiFi network answered starts timing, and the most described preset time period also starts timing when visitor connects corresponding WiFi network,
In 4 hours effectively, outer invalid at 4 hours.
The embodiment of the present invention provide the method, when launch WiFi signal the network equipment receive password instruction is set time,
Obtain temporary login password, and in preset time period, described temporary login password is defined as network described in wireless connections and sets
The second standby wireless entry password, described temporary login password lost efficacy outside described preset time period, wherein, described network
Being previously provided with the first wireless entry password in equipment, described first wireless entry password sets for network described in wireless connections
Standby.
When applying the scheme of the embodiment of the present invention, owing to described temporary login password being defined as nothing in preset time period
Line connects the second wireless entry password of the described network equipment, and described temporary login password lost efficacy outside described preset time period.
So when actually used, the second wireless entry password only can be informed visitor by WiFi network manager so that visitor is only
WiFi network can be used in preset time period, even and if visitor the second wireless entry password is informed more people, due to
Second wireless entry password is interim, and the people informed can not use WiFi network, therefore compared with correlation technique,
Technical scheme is it can be avoided that visitor and informed the net of people's steal WiFi network of wireless entry password by visitor
Network resource.
Additionally, in the aforementioned embodiment, when described temporary login password be user input password time, or described step on temporarily
When record password generates according to the rule being manually set, WiFi network manager is known a priori by temporary login password, at visitor's rope
When taking, temporary login password directly can be informed visitor by owner, but when described temporary login password be utilize common with
When machine number generating algorithm generates, WiFi network manager is not aware that temporary login password in advance, therefore, now such as Fig. 2
Shown in, in a kind of detailed description of the invention of the present invention, except performing step S201 identical with step S101 and step S102
Outside S202, also need to perform step S203.
In step S203, export described temporary login password.
Specifically, during the present invention specifically performs, step S203 has numerous embodiments, for example, it is possible to
Described temporary login password is shown, it is also possible to be sent to by described temporary login password on the display interface of the described network equipment
Preset terminal unit, it is also possible to while showing described temporary login password on the display interface of the described network equipment, will
Described temporary login password is sent to preset terminal unit.Wherein, described default terminal unit is carried by the described network equipment
The terminal unit that WiFi network manager in the WiFi network coverage of confession can check.
It addition, for convenience of memory or administrator password, WiFi network manager is often by the birthday of oneself, Business Name, mobile phone
Number wait private information to be set to wireless entry password, now reveal and will reveal the pipe of WiFi network while wireless entry password
The private information of reason person.In this specific embodiment, described temporary login password (the i.e. second wireless entry password) is
Common Generating Random Number is utilized to generate, so the second wireless entry password is informed visit by WiFi network manager
Visitor, can't reveal the private information of oneself.
During actually used, visitor may leave in preset time period, it is no longer necessary to the second wireless entry password
Surfing the Net, now WiFi network manager wants to stop the use of described second wireless entry password, therefore, at this
In bright another kind of detailed description of the invention, it is also possible to including:
Receive the instruction deleting described second wireless entry password;
Delete the setting of described second wireless entry password in the described network equipment.
Specifically, the WiFi network that the instruction of described second wireless entry password can be provided is deleted by the described network equipment
The terminal unit in coverage with WiFi administration authority is sent to the described network equipment, it is also possible to receives user and is clicking on
The password that after button deleted by corresponding password on the described network equipment, the described network equipment sends arranges instruction etc..At described net
After network equipment receives the instruction deleting described second wireless entry password, perform to delete described the in the described network equipment
The operation of the setting of two wireless entry passwords, specifically, can by revising the program of wireless authentication in the described network equipment,
Delete the related content allowing described second wireless entry password to be authenticated.By changing detailed description of the invention, it is allowed to WiFi
Network manager deletes the certification authority of described second wireless entry password at any time, facilitates WiFi network manager to manage oneself
WiFi network.
It should be added that: previous embodiment be a temporary login password setting up procedure as a example by illustrate,
During the present invention is embodied as, multiple temporary login password, the setting of each temporary login password can be set simultaneously
Process is identical, therefore repeats no more.
Additionally, in preceding method embodiment, identical step can mutually be used for reference, different steps can with independent assortment,
And the scheme formed after different step combinations, falls within protection scope of the present invention.
Relative to above method embodiment, the embodiment of the present invention additionally provides a kind of wireless cipher and arranges device.Such as Fig. 3
Shown in, a kind of wireless cipher provided for the embodiment of the present invention arranges the structural representation of device, is applied to launch WiFi
The network equipment of signal, is previously provided with the first wireless entry password in the described network equipment, described first wireless entry is close
Code network equipment described in the wireless connections, this wireless cipher arranges device and may include that password acquiring unit 301 and close
Code determines unit 302.
Password acquiring unit 301, for when receiving password and arranging instruction, obtains with described first wireless entry password not
Same temporary login password;
Password determines that unit 302 is for being defined as net described in wireless connections by described temporary login password in preset time period
Second wireless entry password of network equipment, described temporary login password lost efficacy outside described preset time period.
The embodiment of the present invention provide this device, when launch WiFi signal the network equipment receive password instruction is set time,
Obtain temporary login password, and in preset time period, described temporary login password is defined as network described in wireless connections and sets
The second standby wireless entry password, described temporary login password lost efficacy outside described preset time period, wherein, described network
Being previously provided with the first wireless entry password in equipment, described first wireless entry password sets for network described in wireless connections
Standby.
When applying the scheme of the embodiment of the present invention, owing to described temporary login password being defined as nothing in preset time period
Line connects the second wireless entry password of the described network equipment, and described temporary login password lost efficacy outside described preset time period.
So when actually used, the second wireless entry password only can be informed visitor by WiFi network manager so that visitor is only
WiFi network can be used in preset time period, even and if visitor the second wireless entry password is informed more people, due to
Second wireless entry password is interim, and the people informed can not use WiFi network, therefore compared with correlation technique,
Technical scheme is it can be avoided that visitor and informed the net of people's steal WiFi network of wireless entry password by visitor
Network resource.
Preferably, in a kind of detailed description of the invention of the present invention, described password acquiring unit 301 may include that judgement
Subelement, password determine that subelement and password generate subelement.
Judgment sub-unit, is used for judging described password to arrange in instruction and whether carries user inputting password;
Password determines subelement, for when described password arrange instruction carries user input password time, by described user
Input password is defined as described temporary login password;
Password generate subelement, for when described password arrange instruction is not carried user input password time, utilize preset
Algorithm generates described temporary login password.
Preferably, as shown in Figure 4, in a kind of detailed description of the invention of the present invention, described wireless cipher arranges device and removes
Including determining that with password acquiring unit 301 and password unit 302 corresponding password acquiring unit 401 and password determine unit
Outside 402, also include: output unit 403.
Described output unit 403 is used for exporting described temporary login password.
Preferably, in a kind of detailed description of the invention of the present invention, described output unit, including: display subelement, and
/ or send subelement;
Described display subelement, for showing described temporary login password on the display interface of the described network equipment;
Described transmission subelement, for being sent to default terminal unit by described temporary login password.
Preferably, in a kind of detailed description of the invention of the present invention, described password arranges and carries set of time letter in instruction
Breath, also includes:
Preset time period determines unit, for determining described preset time period according to described set of time information.
Preferably, in a kind of detailed description of the invention of the present invention, also include:
Instruction reception unit, for receiving the instruction deleting described second wireless entry password;
Delete unit, for deleting the setting of the described second wireless entry password in the described network equipment.
About the device in above-described embodiment, wherein unit performs the concrete mode of operation in relevant the method
Embodiment is described in detail, explanation will be not set forth in detail herein.And it is understood that in above-described embodiment
Device each unit between by the scheme after different unit combinations, the protection of the present invention can be fallen within independent assortment
Scope.
It should be noted that in this article, such as the relational terms of " first " and " second " or the like be used merely to by
One entity or operation separate with another entity or operating space, and not necessarily require or imply these entities or behaviour
Relation or the order of any this reality is there is between work.And, term " includes ", " comprising " or its any its
His variant is intended to comprising of nonexcludability, so that include the process of a series of key element, method, article or set
Standby not only include those key elements, but also include other key elements being not expressly set out, or also include for this process,
The key element that method, article or equipment are intrinsic.
Those skilled in the art it can be understood that can add by software to the technology in the embodiment of the present invention required
The mode of general hardware platform realizes.Based on such understanding, the technical scheme in the embodiment of the present invention substantially or
Saying that the part contributing prior art can embody with the form of software product, this computer software product is permissible
It is stored in storage medium, such as ROM/RAM, magnetic disc, CD etc., instructs with so that a computer sets including some
Standby (can be personal computer, server, or the network equipment etc.) performs each embodiment of the present invention or embodiment
The method described in some part.
Invention described above embodiment, is not intended that limiting the scope of the present invention.Any the present invention's
Amendment, equivalent and the improvement etc. made within spirit and principle, should be included within the scope of the present invention.
Claims (12)
1. a wireless cipher method to set up, is applied to launch the network equipment of WiFi signal, sets in advance in the described network equipment
Being equipped with the first wireless entry password, described first wireless entry password is for the network equipment described in wireless connections, it is characterised in that
Described method includes:
When receiving password and arranging instruction, obtain the temporary login password different from described first wireless entry password;
The second wireless entry that described temporary login password is defined as in preset time period the network equipment described in wireless connections is close
Code, described temporary login password lost efficacy outside described preset time period.
Method the most according to claim 1, it is characterised in that described acquisition is different from described first wireless entry password
Temporary login password, including:
Judge described password to arrange in instruction whether to carry user to input password;
When described password arrange instruction carries user input password time, described user is inputted password and is defined as described stepping on temporarily
Record password;
When described password arrange instruction is not carried user input password time, utilize preset algorithm generate described temporary login password.
Method the most according to claim 1, it is characterised in that also include:
Export described temporary login password.
Method the most according to claim 3, it is characterised in that described output described temporary login password, including:
The display interface of the described network equipment shows described temporary login password, and/or, described temporary login password is sent
Give and preset terminal unit.
5. according to the method described in any one of claim 1-4, it is characterised in that described password arranges the time that carries in instruction
Configuration information, also includes:
Described preset time period is determined according to described set of time information.
Method the most according to claim 5, it is characterised in that also include:
Receive the instruction deleting described second wireless entry password;
Delete the setting of described second wireless entry password in the described network equipment.
7. wireless cipher arranges a device, is applied to launch the network equipment of WiFi signal, sets in advance in the described network equipment
Being equipped with the first wireless entry password, described first wireless entry password is for the network equipment described in wireless connections, it is characterised in that
Described device includes:
Password acquiring unit, for when receiving password and arranging instruction, obtains and described first different the facing of wireless entry password
Time login password;
Password determines unit, for described temporary login password being defined as the network equipment described in wireless connections in preset time period
The second wireless entry password, described temporary login password lost efficacy outside described preset time period.
Device the most according to claim 7, it is characterised in that described password acquiring unit, including:
Judgment sub-unit, is used for judging described password to arrange in instruction and whether carries user inputting password;
Password determines subelement, for when described password arrange instruction carries user input password time, described user is inputted
Password is defined as described temporary login password;
Password generate subelement, for when described password arrange instruction is not carried user input password time, utilize preset algorithm
Generate described temporary login password.
Device the most according to claim 7, it is characterised in that also include:
Output unit, is used for exporting described temporary login password.
Device the most according to claim 9, it is characterised in that described output unit, including: display subelement, and/
Or transmission subelement;
Described display subelement, for showing described temporary login password on the display interface of the described network equipment;
Described transmission subelement, for being sent to default terminal unit by described temporary login password.
11. according to the device described in any one of claim 7-10, it is characterised in that described password is arranged when carrying in instruction
Between configuration information, also include:
Preset time period determines unit, for determining described preset time period according to described set of time information.
12. devices according to claim 11, it is characterised in that also include:
Instruction reception unit, for receiving the instruction deleting described second wireless entry password;
Delete unit, for deleting the setting of the described second wireless entry password in the described network equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610197206.7A CN105847058A (en) | 2016-03-31 | 2016-03-31 | Wireless password setting method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610197206.7A CN105847058A (en) | 2016-03-31 | 2016-03-31 | Wireless password setting method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105847058A true CN105847058A (en) | 2016-08-10 |
Family
ID=56596431
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610197206.7A Pending CN105847058A (en) | 2016-03-31 | 2016-03-31 | Wireless password setting method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105847058A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107359991A (en) * | 2017-08-22 | 2017-11-17 | 上海斐讯数据通信技术有限公司 | A kind of router, the method for generating cipher code of router guest network and system |
CN107466037A (en) * | 2017-09-06 | 2017-12-12 | 上海斐讯数据通信技术有限公司 | A kind of login method and system of router guest network |
CN107529170A (en) * | 2017-09-11 | 2017-12-29 | 上海斐讯数据通信技术有限公司 | A kind of method and system of management router guest network |
WO2018103527A1 (en) * | 2016-12-06 | 2018-06-14 | 中兴通讯股份有限公司 | Authentication method and authentication device |
CN110519056A (en) * | 2019-10-11 | 2019-11-29 | 广东虹勤通讯技术有限公司 | A kind of login method, method for generating cipher code and its relevant apparatus |
CN110555302A (en) * | 2019-07-22 | 2019-12-10 | 珠海格力电器股份有限公司 | Unlocking method and device and electronic equipment |
CN111148095A (en) * | 2020-01-03 | 2020-05-12 | 华为技术有限公司 | Method for establishing Wi-Fi connection between terminal and wireless access point |
US10708058B2 (en) | 2016-11-04 | 2020-07-07 | Interdigital Ce Patent Holdings, Sas | Devices and methods for client device authentication |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103428159A (en) * | 2012-05-14 | 2013-12-04 | 联想(北京)有限公司 | Method for logging in to program and server |
CN104519020A (en) * | 2013-09-29 | 2015-04-15 | 阿里巴巴集团控股有限公司 | Method, server and system for managing wireless network login password sharing function |
CN104870068A (en) * | 2014-04-02 | 2015-08-26 | 华为终端有限公司 | Method and router for access network |
CN105228149A (en) * | 2015-09-29 | 2016-01-06 | 小米科技有限责任公司 | Access point method of attachment, device and access point |
CN105307169A (en) * | 2015-09-18 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Access method, device and system for guest network |
-
2016
- 2016-03-31 CN CN201610197206.7A patent/CN105847058A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103428159A (en) * | 2012-05-14 | 2013-12-04 | 联想(北京)有限公司 | Method for logging in to program and server |
CN104519020A (en) * | 2013-09-29 | 2015-04-15 | 阿里巴巴集团控股有限公司 | Method, server and system for managing wireless network login password sharing function |
CN104870068A (en) * | 2014-04-02 | 2015-08-26 | 华为终端有限公司 | Method and router for access network |
CN105307169A (en) * | 2015-09-18 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Access method, device and system for guest network |
CN105228149A (en) * | 2015-09-29 | 2016-01-06 | 小米科技有限责任公司 | Access point method of attachment, device and access point |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10708058B2 (en) | 2016-11-04 | 2020-07-07 | Interdigital Ce Patent Holdings, Sas | Devices and methods for client device authentication |
WO2018103527A1 (en) * | 2016-12-06 | 2018-06-14 | 中兴通讯股份有限公司 | Authentication method and authentication device |
CN108616885A (en) * | 2016-12-06 | 2018-10-02 | 中兴通讯股份有限公司 | a kind of authentication method and device |
CN107359991A (en) * | 2017-08-22 | 2017-11-17 | 上海斐讯数据通信技术有限公司 | A kind of router, the method for generating cipher code of router guest network and system |
WO2019037350A1 (en) * | 2017-08-22 | 2019-02-28 | 上海斐讯数据通信技术有限公司 | Router and method for generating guest network password of router and system |
CN107466037A (en) * | 2017-09-06 | 2017-12-12 | 上海斐讯数据通信技术有限公司 | A kind of login method and system of router guest network |
CN107466037B (en) * | 2017-09-06 | 2020-12-22 | 金华市智甄通信设备有限公司 | Login method and system for router visitor network |
CN107529170A (en) * | 2017-09-11 | 2017-12-29 | 上海斐讯数据通信技术有限公司 | A kind of method and system of management router guest network |
CN110555302A (en) * | 2019-07-22 | 2019-12-10 | 珠海格力电器股份有限公司 | Unlocking method and device and electronic equipment |
CN110519056A (en) * | 2019-10-11 | 2019-11-29 | 广东虹勤通讯技术有限公司 | A kind of login method, method for generating cipher code and its relevant apparatus |
CN111148095A (en) * | 2020-01-03 | 2020-05-12 | 华为技术有限公司 | Method for establishing Wi-Fi connection between terminal and wireless access point |
WO2021136097A1 (en) * | 2020-01-03 | 2021-07-08 | 华为技术有限公司 | Method for establishing wi-fi connection between terminal and wireless access point |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105847058A (en) | Wireless password setting method and device | |
CN104158808B (en) | Portal authentication method and its device based on APP applications | |
KR101018435B1 (en) | Apparatus and method for security management of user terminal | |
CN104636924B (en) | Secure payment method, server and system | |
JP2003188885A5 (en) | ||
JP4762660B2 (en) | Wireless LAN system, wireless LAN terminal, and initial setting method of wireless LAN terminal | |
CN104883259A (en) | Method for automatic registration by using mobile phone number as network application account number | |
CN103152402A (en) | Method and system for logging in through mobile terminal and cloud server | |
CN108632056A (en) | A kind of smart machine network collocating method and system | |
CN104144163A (en) | Identity verification method, device and system | |
CN105184155B (en) | Application program display control method and device in terminal | |
CN105407041A (en) | Method for adding group or friend, server, client and system | |
CN103905399A (en) | Account registration management method and apparatus | |
CN107622547A (en) | Method, apparatus, storage medium and the computer equipment that terminal is unlocked | |
CN107592314A (en) | A kind of order line authority control method and device | |
CN104052757B (en) | Identification system and method based on the client application in mobile phone | |
CN103929501B (en) | Intelligent distant control server and its control method | |
CN109428893A (en) | A kind of identity identifying method, apparatus and system | |
CN102413146A (en) | Client authorized logon method based on dynamic codes | |
US10938806B2 (en) | Communication method and device | |
CN108289290A (en) | A kind of method and apparatus for connecting intelligent wearable device and wireless access point | |
CN107872379A (en) | A kind of terminal control method and device based on RCS message | |
CN108471409B (en) | The application programming interfaces authentication configuration method and system of voice dialogue platform | |
CN108989998A (en) | A kind of information processing method and device | |
CN111046314A (en) | Report form viewing method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160810 |