CN105848148A - WIFI connection method, terminal and router - Google Patents

WIFI connection method, terminal and router Download PDF

Info

Publication number
CN105848148A
CN105848148A CN201610281275.6A CN201610281275A CN105848148A CN 105848148 A CN105848148 A CN 105848148A CN 201610281275 A CN201610281275 A CN 201610281275A CN 105848148 A CN105848148 A CN 105848148A
Authority
CN
China
Prior art keywords
terminal
identification code
authentication
router
wifi
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610281275.6A
Other languages
Chinese (zh)
Inventor
孙孝文
黄长江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV Mobile Intelligent Information Technology Beijing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610281275.6A priority Critical patent/CN105848148A/en
Publication of CN105848148A publication Critical patent/CN105848148A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

An embodiment of the invention provides a WIFI connection method, a terminal and a router and relates to the field of communication technology. The method is applied to a first terminal and includes receiving an identification code of a to-be-accessed second terminal sent by the router; performing authentication operation according to the identification code and generating authentication result information; sending the authentication result information to the router. According to the embodiment of the invention, a new user authentication process is transferred to the terminal having administrator authority from the router, so that illegal WIFI connection caused by password divulgence can be avoided, network bandwidth resources can be protected, normal network use is ensured and user experience is improved.

Description

WIFI method of attachment, terminal and router
Technical field
The present embodiments relate to communication technical field, particularly relate to a kind of WIFI method of attachment, end End and router.
Background technology
Along with popularizing, more and more of the terminals such as notebook computer, panel computer, smart mobile phone Terminal uses adopting wireless fidelity technology (WIreless FIdelity;Hereinafter referred to as: WIFI) network. Traditional WIFI connects, and needs user to search for wireless network in terminal, then inputs password, by Router authenticates, as long as password is correct, terminal just can be successfully connected.
Inventor is during realizing the present invention, and at least there are the following problems to find prior art: If WIFI password is by malicious dissemination or cracks, then WIFI is by the most stolen company so that lose net Network bandwidth resources, the proper network affecting user is used by serious conditions.
Summary of the invention
The embodiment of the present invention provides a kind of WIFI method of attachment, terminal and router, to avoid because of close The WIFI that code leaks and causes steals even.
For reaching above-mentioned purpose, embodiments provide a kind of WIFI method of attachment, described side Method is applied to first terminal, including: the identification of the second terminal to be accessed that receiving router sends Code;Carry out authentication operations according to described identification code, generate authentication result information;By described authentication knot Really information sends to described router.
The embodiment of the present invention additionally provides a kind of WIFI method of attachment, and described method is applied to first eventually End, including: the identification code of the second terminal to be accessed that receiving router sends;According to described knowledge Other code carries out authentication operations;If authentication is passed through, then send to described router and access instruction information, Described access instruction information is used for indicating described router to set up WIFI with described second terminal and is connected.
The embodiment of the present invention additionally provides a kind of WIFI method of attachment, and described method is applied to route Device, including: receiving the connection request that the second terminal to be accessed sends, described connection request comprises The identification code of described second terminal;Described identification code is sent to first terminal;According to described first The authentication result information that terminal returns, it is determined whether set up WIFI with described second terminal and be connected.
The embodiment of the present invention additionally provides a kind of WIFI method of attachment, and described method is applied to route Device, including: receiving the connection request that the second terminal to be accessed sends, described connection request comprises The identification code of described second terminal;Described identification code is sent to first terminal;According to described first The access instruction information that terminal returns, performs to set up, with described second terminal, the operation that WIFI is connected.
The embodiment of the present invention additionally provides a kind of terminal, for first terminal, including: first receives mould Block, for the identification code of the second terminal to be accessed that receiving router sends;First authentication module, Described identification code for receiving according to described first receiver module carries out authentication operations, generates mirror Power object information;First sending module, for the described authentication described first authentication module generated Object information sends to described router.
The embodiment of the present invention additionally provides a kind of terminal, for first terminal, including: second receives mould Block, for the identification code of the second terminal to be accessed that receiving router sends;Second authentication module, Described identification code for receiving according to described second receiver module carries out authentication operations;Second Send module, for when authentication by time, to described router send access instruction information, described in connect Enter instruction information to be connected for indicating described router to set up WIFI with described second terminal.
The embodiment of the present invention additionally provides a kind of router, including: the 3rd receiver module, it is used for connecing Receiving the connection request that the second terminal to be accessed sends, described connection request comprises described second terminal Identification code;3rd sending module, for sending described identification code to first terminal;First holds Row module, for the authentication result information returned according to described first terminal, it is determined whether with described Second terminal is set up WIFI and is connected.
The embodiment of the present invention additionally provides a kind of router, including: the 4th receiver module, it is used for connecing Receiving the connection request that the second terminal to be accessed sends, described connection request comprises described second terminal Identification code;4th sending module, for sending described identification code to first terminal;Second holds Row module, for the access instruction information returned according to described first terminal, performs and described second Terminal sets up the operation that WIFI connects.
WIFI method of attachment, terminal and the router that the embodiment of the present invention provides, by using new The authentication process at family is transferred to the terminal with administrator right by router, it is to avoid because password is let out The WIFI leaked and cause steals even, protects network bandwidth resources, it is ensured that normal Web vector graphic, Improve Consumer's Experience.
Accompanying drawing explanation
The method flow diagram of one embodiment of WIFI method of attachment that Fig. 1 provides for the present invention;
The method flow diagram of WIFI another embodiment of method of attachment that Fig. 2 provides for the present invention;
The method flow diagram of WIFI another embodiment of method of attachment that Fig. 3 provides for the present invention;
The method flow diagram of the WIFI method of attachment further embodiment that Fig. 4 provides for the present invention;
The method flow diagram of the WIFI method of attachment a still further embodiment that Fig. 5 provides for the present invention;
The structural representation of one embodiment of terminal that Fig. 6 provides for the present invention;
The structural representation of another embodiment of terminal that Fig. 7 provides for the present invention;
The structural representation of another embodiment of terminal that Fig. 8 provides for the present invention;
The structural representation of one embodiment of router that Fig. 9 provides for the present invention;
The structural representation of another embodiment of router that Figure 10 provides for the present invention.
Description of reference numerals:
610-the first receiver module, 620-the first authentication module, 630-the first sending module, 621- One transmitting element, 622-the first authenticating unit, 623-the second transmitting element, 624-the second authenticating unit, 640-the first binding module, 810-the second receiver module, 820-the second authentication module, 830-second Send module, 821-the 3rd transmitting element, 822-the 3rd authenticating unit, 823-the 4th transmitting element, 824- 4th authenticating unit, 840-the second binding module, 910-the 3rd receiver module, 920-the 3rd send mould Block, 930-first performs module, 940-the 3rd binding module, 1010-the 4th receiver module, 1020- 4th sending module, 1030-second perform module, 1040-the 4th binding module.
Detailed description of the invention
Below in conjunction with the accompanying drawings the method for attachment of embodiment of the present invention WIFI, terminal and router are carried out in detail Thin description.
Embodiment one
The method flow diagram of one embodiment of WIFI method of attachment that Fig. 1 provides for the present invention, the party The executive agent of method can be the various terminal devices with administrator right, e.g., notebook computer, The intelligent digital product such as mobile phone, Pad, it is also possible to for being integrated in the device on these terminal devices or core Sheet.As it is shown in figure 1, this WIFI method of attachment is applied to first terminal, comprise the steps:
S110, the identification code of the second terminal to be accessed that receiving router sends.
When the terminal (the second terminal to be accessed) of new user is intended to add certain WIFI network, to this The router of network sends connection request, contains the identification code of the second terminal in this connection request. There is this identification code that the first terminal receiving router of administrator right sends.Implement in the present invention In example, the identification code of the second terminal can be that the media interviews of computer control (Medium/Media Access Control;Hereinafter referred to as: MAC) address or phone number etc..
S120, carries out authentication operations according to this identification code, generates authentication result information.
First terminal authenticates according to the identification code received, and generates authentication result information.
S130, sends above-mentioned authentication result information to router.
Router is according to authentication result information, it is determined whether sets up WIFI with the second terminal and is connected, as Fruit authentication is passed through, then router performs to set up, with the second terminal, the operation that WIFI is connected;If authentication Do not pass through, then router performs refusal and sets up, with the second terminal, the operation that WIFI is connected.Illustrate, The WIFI method of attachment that the embodiment of the present invention provides can apply in hotel WIFI management.Client Meeting typing phone number when registering, therefore first terminal can be by the phone number of the second terminal With the number phase comparison of typing during registration, when such a match occurs, authentication is passed through, and performs with second eventually End sets up the operation that WIFI connects;When both do not mate, perform refusal and set up with the second terminal The operation that WIFI connects, to prevent non-Hotel Customer from stealing even WIFI.
The WIFI method of attachment that the embodiment of the present invention provides, by by the authentication process of new user by Router is transferred to the terminal with administrator right, it is to avoid the WIFI caused because of password leakage The company of robber, protects network bandwidth resources, it is ensured that normal Web vector graphic, improves Consumer's Experience.
Embodiment two
The method flow diagram of WIFI another embodiment of method of attachment that Fig. 2 provides for the present invention.As Shown in Fig. 2, on the basis of above-described embodiment, the WIFI method of attachment that the present embodiment provides is permissible Further include steps of
S210, carries out initial setting up to router, carries out bindings with router, determines first The administrator right of terminal.
When router is carried out initial setting up, a terminal can be selected to bind with router, Determine the administrator right of this terminal.
S220, the identification code of the second terminal to be accessed that receiving router sends.
S230, shows this identification code by display screen.
After first terminal receives the identification code of the second terminal to be accessed, a management can be triggered Member's authentication interface, keeper (holder of first terminal) is in the authentication interface shown by display screen It can be seen that attempt to connect to the identification code of the terminal (that is, the second terminal) of router.
S240, obtains finger print data, according to the comparison result of this finger print data Yu pre-stored fingerprint information, Generate authentication result information.
Keeper is after authentication interface sees the identification code of the second terminal to be accessed, based on this identification Code, determines whether the second terminal can access.If agreeing to the second terminal connection route device, then record Entering fingerprint, the finger print data of typing is compared by first terminal with pre-stored fingerprint information, Liang Zhexiang Coupling, authentication is passed through.If keeper disagrees the second terminal connection route device, then directly generate The authentication result information that authentication is not passed through.Or when first terminal is held by non-administrator, non-pipe The finger print data of reason person's typing does not mates with pre-stored fingerprint information, then authenticate and do not pass through.
Step S240 can also be: obtains code data, according to this code data and presetting cipher Comparison result, generates authentication result information.In authentication interface, keeper sees that to be accessed second is eventually After the identification code of end, based on this identification code, determine whether the second terminal can access.If agreed to Second terminal connection route device, it is also possible to input password, first terminal by this code data with preset Password is compared, and both match, and authentication is passed through.If keeper disagrees the second terminal even Connect router, then directly generate the authentication result information that authentication is not passed through.Or when first terminal quilt When non-administrator holds, non-administrator cannot know correct password, and the password of input is close with preset Code does not mates, then authenticate and do not pass through.Inputted password by keeper, can avoid disclosing to user close Code, in order to avoid password is revealed.
S250, sends above-mentioned authentication result information to router.
Router is according to authentication result information, it is determined whether sets up WIFI with the second terminal and is connected, as Fruit authentication is passed through, then router performs to set up, with the second terminal, the operation that WIFI is connected;If authentication Do not pass through, then router performs refusal and sets up, with the second terminal, the operation that WIFI is connected.
The WIFI method of attachment that the embodiment of the present invention provides, by by the authentication process of new user by Router is transferred to the terminal with administrator right, by advance with router binding there is management The terminal of member's authority carries out fingerprint or cipher authentication, it is to avoid the WIFI caused because of password leakage steals Even, protect network bandwidth resources, it is ensured that normal Web vector graphic, improve Consumer's Experience.
Embodiment three
The method flow diagram of WIFI another embodiment of method of attachment that Fig. 3 provides for the present invention, should The executive agent of method can be the terminal with administrator right, it is also possible to have pipe for being integrated in Device in the terminal of reason person's authority or chip.As it is shown on figure 3, this WIFI method of attachment is applied to First terminal, comprises the steps:
Step 310, the identification code of the second terminal to be accessed that receiving router sends;
When the terminal (the second terminal) of new user is intended to add certain WIFI network, to the road of this network Sent connection request by device, this connection request contains the identification code of the second terminal.There is management This identification code that the first terminal receiving router of member's authority sends.In embodiments of the present invention, The identification code of two terminals can be MAC Address or the phone number etc. of computer.Router is being entered During row initial setting up, a terminal can be selected to bind with router, determine the pipe of this terminal Reason person's authority.
Step 320, carries out authentication operations according to this identification code;
In embodiments of the present invention, step 320 may include that and shows this identification code by display screen; Based on this identification code, determine whether the second terminal can access;As the second terminal can access, obtain Print data, compare this finger print data with pre-stored fingerprint information, if matched, true Think that authentication is passed through, if not mating, confirming as authenticating and not passing through.First terminal receives second After the identification code of terminal, can trigger an administrator authentication interface, keeper be (first terminal Holder) in the authentication interface shown by display screen it can be seen that attempt to connect to the terminal of router The identification code of (that is, the second terminal).If keeper agrees to the second terminal connection route device, then Typing fingerprint, the finger print data of typing compared by first terminal with pre-stored fingerprint information, both Matching, authentication is passed through.When first terminal is held by non-administrator, the finger of non-administrator's typing Line data are not mated with pre-stored fingerprint information, then authenticate and do not pass through.
Further, step 320 can also include: shows this identification code by display screen;Based on This identification code, determines whether the second terminal can access;As the second terminal can access, obtain close Code data, compare this code data with presetting cipher, if matched, confirm as authentication Pass through, if not mating, confirming as authenticating and not passing through.If keeper agrees to the second terminal link road By device, it is also possible to input password, this code data is compared by first terminal with presetting cipher, Both match, and authentication is passed through.When first terminal is held by non-administrator, non-administrator cannot Knowing correct password, the password of input does not mates with presetting cipher, then authenticate and do not pass through.By managing Reason person inputs password, can avoid to user's open code, in order to avoid password is revealed.
Step 330, if authentication is passed through, then sends to router and accesses instruction information, and this access refers to Show that information connects for indicating router and the second terminal to set up WIFI.
The WIFI method of attachment that the embodiment of the present invention provides, by by the authentication process of new user by Router is transferred to the terminal with administrator right, by advance with router binding there is management The terminal of member's authority carries out fingerprint or cipher authentication, it is to avoid the WIFI caused because of password leakage steals Even, protect network bandwidth resources, it is ensured that normal Web vector graphic, improve Consumer's Experience.
Embodiment four
The method flow diagram of the WIFI method of attachment further embodiment that Fig. 4 provides for the present invention, should The executive agent of method can be router, it is also possible to for integrated device on the router or chip. As shown in Figure 4, this WIFI method of attachment comprises the steps:
Step 410, receives the connection request that the second terminal to be accessed sends, and this connection request comprises The identification code of the second terminal.
Step 420, sends this identification code to first terminal.
Before step 410, it is also possible to router is carried out initial setting up, carry out with first terminal Bindings, determines the administrator right of first terminal.Terminal (the second terminal) as new user When being intended to add this WIFI network, send connection request to this router, this connection request contains The identification code of the second terminal to be added.This identification code is sent to having administrator right by router First terminal.
Step 430, the authentication result information returned according to first terminal, it is determined whether with the second terminal Set up WIFI to connect.
First terminal authenticates according to the identification code received, and generates authentication result information, and will It is back to router.The authentication result information that router returns according to first terminal, it is determined whether Setting up WIFI with the second terminal to be connected, if authentication is passed through, then router performs to build with the second terminal The operation that vertical WIFI connects;If authentication is not passed through, then router performs to refuse to build with the second terminal The operation that vertical WIFI connects.
The WIFI method of attachment that the embodiment of the present invention provides, by by the authentication process of new user by Router is transferred to the terminal with administrator right, it is to avoid the WIFI caused because of password leakage The company of robber, protects network bandwidth resources, it is ensured that normal Web vector graphic, improves Consumer's Experience.
Embodiment five
The method flow diagram of the WIFI method of attachment a still further embodiment that Fig. 5 provides for the present invention, should The executive agent of method can be router, it is also possible to for integrated device on the router or chip. As it is shown in figure 5, this WIFI method of attachment comprises the steps:
Step 510, receives the connection request that the second terminal to be accessed sends, and this connection request comprises The identification code of the second terminal.
Step 520, sends this identification code to first terminal.
Before step 510, it is also possible to router is carried out initial setting up, carry out with first terminal Bindings, determines the administrator right of first terminal.Terminal (the second terminal) as new user When being intended to add this WIFI network, send connection request to this router, this connection request contains The identification code of the second terminal to be added.This identification code is sent to having administrator right by router First terminal.
Step 530, the access instruction information returned according to first terminal, perform to set up with the second terminal The operation that WIFI connects.
When first terminal authentication by after, to router return access instruction information, router according to This access instruction information is set up WIFI with the second terminal and is connected.
The WIFI method of attachment that the embodiment of the present invention provides, by by the authentication process of new user by Router is transferred to the terminal with administrator right, it is to avoid the WIFI caused because of password leakage The company of robber, protects network bandwidth resources, it is ensured that normal Web vector graphic, improves Consumer's Experience.
Embodiment six
The structural representation of one embodiment of terminal that Fig. 6 provides for the present invention, can be used for performing such as Method step shown in Fig. 1.As shown in Figure 6, this terminal is first terminal, including: first connects Receive module the 610, first authentication module 620 and the first sending module 630.
Wherein, the second terminal to be accessed that the first receiver module 610 sends for receiving router Identification code;First authentication module 620 is for the identification received according to the first receiver module 610 Code carries out authentication operations, generates authentication result information;First sending module 630 is for reflecting first The authentication result information that power module 620 generates sends to router.
When the terminal (the second terminal) of new user is intended to add certain WIFI network, to the road of this network Sent connection request by device, this connection request contains the identification code of the second terminal.First receives This identification code that module 610 receiving router sends.First authentication module 620 is according to receiving Identification code authenticates, and generates authentication result information.The authentication that first sending module 630 will generate Object information sends to router, and router is according to authentication result information, it is determined whether with second eventually End is set up WIFI and is connected, if authentication is passed through, then router performs to set up WIFI with the second terminal The operation connected;If authentication is not passed through, then router performs refusal and sets up WIFI with the second terminal The operation connected.
The terminal that the embodiment of the present invention provides, by being turned by router the authentication process of new user Move to the terminal with administrator right, it is to avoid the WIFI caused because of password leakage steals even, protects Protect network bandwidth resources, it is ensured that normal Web vector graphic, improve Consumer's Experience.
Embodiment seven
The structural representation of another embodiment of terminal that Fig. 7 provides for the present invention.As it is shown in fig. 7, On the basis of above-mentioned embodiment illustrated in fig. 6, the first authentication module 620 may include that first Send unit 621 and the first authenticating unit 622.
Wherein, the first transmitting element 621 is for showing the transmission of above-mentioned identification code to display screen; First authenticating unit 622, for based on this identification code, determines whether the second terminal can access;As Second terminal can access, and obtains finger print data, according to this finger print data and pre-stored fingerprint information Comparison result, generates authentication result information.
After first receiver module 610 receives the identification code of the second terminal, a management can be triggered Member's authentication interface, above-mentioned identification code is sent certification circle to display screen by the first transmitting element 621 Face shows, keeper (holder of first terminal) in this authentication interface it can be seen that attempt It is connected to the identification code of the terminal (that is, the second terminal) of router.Keeper sees in authentication interface After the identification code of the second terminal to be accessed, if agreeing to the second terminal connection route device, then record Entering fingerprint, the finger print data of typing is compared by the first authenticating unit 622 with pre-stored fingerprint information, Both match, and authentication is passed through.If keeper disagrees the second terminal connection route device, then One authenticating unit 622 directly generates the authentication result information that authentication is not passed through.Or work as first terminal When being held by non-administrator, the first authenticating unit 622 by the finger print data of non-administrator's typing with pre- Depositing finger print information to compare, both do not mate, then authenticate and do not pass through.
Further, the first authentication module 620 can also include: the second transmitting element 623 and Two authenticating unit 624.Wherein, the second transmitting element 623 is for sending above-mentioned identification code to display Screen shows;Whether second authenticating unit 624, for based on this identification code, determines the second terminal Can access;As the second terminal can access, obtain code data, according to this code data with pre- Put the comparison result of password, generate authentication result information.
After first receiver module 610 receives the identification code of the second terminal to be accessed, can trigger One administrator authentication interface, above-mentioned identification code is sent to display screen by the second transmitting element 623 Authentication interface show, keeper (holder of first terminal) is permissible in this authentication interface See the identification code of the terminal (that is, the second terminal) attempting to connect to router.Keeper is recognizing After the identification code of the second terminal to be accessed is seen at card interface, if agreeing to the second terminal connection route Device, then input password, and the code data of input is carried out by the second authenticating unit 624 with presetting cipher Comparison, both match, and authentication is passed through.If keeper disagrees the second terminal connection route device, Then the second authenticating unit 624 directly generates the authentication result information that authentication is not passed through.Or when first When terminal is held by non-administrator, the code data that non-administrator is inputted by the second authenticating unit 624 Comparing with presetting cipher, both do not mate, then authenticate and do not pass through.Password is inputted by keeper, Can avoid to user's open code, in order to avoid password is revealed.
The terminal that the embodiment of the present invention provides, it is also possible to including: the first binding module 640.This is first years old Binding module 640 may be used for router is carried out initial setting up, carries out bindings with router, Determine the administrator right of this first terminal.
The terminal that the embodiment of the present invention provides, by being turned by router the authentication process of new user Move to the terminal with administrator right, by advance with router binding there is administrator right Terminal carries out fingerprint or cipher authentication, it is to avoid the WIFI caused because of password leakage steals even, protection Network bandwidth resources, it is ensured that normal Web vector graphic, improves Consumer's Experience.
Embodiment eight
The structural representation of another embodiment of terminal that Fig. 8 provides for the present invention.As shown in Figure 8, Can be used for the method step performed as shown in Figure 3.As shown in Figure 8, this terminal is first terminal, Including: the second receiver module the 810, second authentication module 820 and the second sending module 830.Wherein, The identification code of the second terminal to be accessed that the second receiver module 810 sends for receiving router; Second authentication module 820 authenticates for the identification code received according to the second receiver module 810 Operation;Second sending module 830 for when authentication by time, send to router and access instruction letter Breath, this access instruction information is used for indicating router and the second terminal to set up WIFI and connects.
When the terminal (the second terminal) of new user is intended to add certain WIFI network, to the road of this network Sent connection request by device, this connection request contains the identification code of the second terminal to be added. This identification code that second receiver module 810 receiving router sends.Second authentication module 820 basis The identification code received carries out authentication operations.When authentication by time, the second sending module 830 is to road Being sent by device and access instruction information, router performs to set up, with the second terminal, the operation that WIFI is connected.
In embodiments of the present invention, the second authentication module 820 may include that the 3rd transmitting element 821 With the 3rd authenticating unit 822.Wherein, the 3rd transmitting element 821 is for sending above-mentioned identification code extremely Display screen shows;3rd authenticating unit 822, for based on this identification code, determines the second terminal Whether can access;As the second terminal can access, obtain finger print data, by this finger print data with Pre-stored fingerprint information is compared, if matching, confirming as authentication and passing through, if do not mated, Confirm as authenticating and do not pass through.
After second receiver module 810 receives the identification code of the second terminal to be accessed, can trigger One administrator authentication interface, above-mentioned identification code is sent to display screen by the 3rd transmitting element 821 Authentication interface show, keeper (holder of first terminal) is permissible in this authentication interface See the identification code of the terminal (that is, the second terminal) attempting to connect to router.Keeper is recognizing After the identification code of the second terminal to be accessed is seen at card interface, if agreeing to the second terminal connection route Device, then typing fingerprint, the 3rd authenticating unit 822 is by the finger print data of typing and pre-stored fingerprint information Comparing, both match, and authentication is passed through.When first terminal is held by non-administrator, the The finger print data of non-administrator's typing is compared by three authenticating unit 822 with pre-stored fingerprint information, Both do not mate, then authenticate and do not pass through.
Second authentication module 820 can also include: the 4th transmitting element 823 and the 4th authenticating unit 824.Wherein, the 4th transmitting element 823 is for showing the transmission of above-mentioned identification code to display screen; 4th authenticating unit 824, for based on this identification code, determines whether the second terminal can access;As Second terminal can access, and obtains code data, is compared with presetting cipher by this code data, If matching, confirming as authentication and passing through, if not mating, confirming as authenticating and not passing through.
After second receiver module 810 receives the identification code of the second terminal to be accessed, can trigger One administrator authentication interface, above-mentioned identification code is sent to display screen by the 4th transmitting element 823 Authentication interface show, keeper (holder of first terminal) is permissible in this authentication interface See the identification code of the terminal (that is, the second terminal) attempting to connect to router.Keeper is recognizing After the identification code of the second terminal to be accessed is seen at card interface, if agreeing to the second terminal connection route Device, then input password, and the code data of input is carried out by the 4th authenticating unit 824 with presetting cipher Comparison, both match, and authentication is passed through.When first terminal is held by non-administrator, the 4th mirror The code data that non-administrator inputs is compared by power unit 824 with presetting cipher, and both are not Join, then authenticate and do not pass through.Inputted password by keeper, can avoid to user's open code, with Exempt from password to reveal.
Further, the terminal that the embodiment of the present invention provides, it is also possible to including: the second binding module 840.This second binding module 840 may be used for router is carried out initial setting up, enters with router Row bindings, determines the administrator right of first terminal.
The terminal that the embodiment of the present invention provides, by being turned by router the authentication process of new user Move to the terminal with administrator right, by advance with router binding there is administrator right Terminal carries out fingerprint or cipher authentication, it is to avoid the WIFI caused because of password leakage steals even, protection Network bandwidth resources, it is ensured that normal Web vector graphic, improves Consumer's Experience.
Embodiment nine
The structural representation of one embodiment of router that Fig. 9 provides for the present invention, can be used for performing Method step as shown in Figure 4.As it is shown in figure 9, this router may include that the 3rd reception mould Block the 910, the 3rd sending module 920 and first performs module 930.
Wherein, the connection that the 3rd receiver module 910 sends for receiving the second terminal to be accessed please Asking, this connection request comprises the identification code of the second terminal;3rd sending module 920 is for by above-mentioned Identification code sends to first terminal;First performs module 930 for the mirror returned according to first terminal Power object information, it is determined whether set up with above-mentioned second terminal and be connected WIFI connection.
When terminal (the second terminal) WIFI network to be added of new user, send to this router Connection request, contains the identification code of the second terminal in this connection request.3rd receiver module 910 Receiving the connection request that the second terminal sends, this identification code is sent to tool by the 3rd sending module 920 There is the first terminal of administrator right.First terminal authenticates according to the identification code received, raw Become authentication result information, and return it to router.If authentication is passed through, then first perform mould Block 930 performs to set up, with the second terminal, the operation that WIFI is connected;If authentication is not passed through, then first Perform module 930 to perform to refuse to set up, with the second terminal, the operation that WIFI is connected.
Further, the router that the present embodiment provides can also include: the 3rd binding module 940. 3rd binding module 940 is used for carrying out initial setting up, carries out bindings with first terminal, really Determine the administrator right of first terminal.
The router that the embodiment of the present invention provides, by by the authentication process of new user by router Be transferred to the terminal with administrator right, by advance with router binding there is administrator right Terminal be authenticated, it is to avoid the WIFI caused because of password leakage steals even, protects Netowrk tape Wide resource, it is ensured that normal Web vector graphic, improves Consumer's Experience.
Embodiment ten
The structural representation of another embodiment of router that Figure 10 provides for the present invention, can be used for holding Row method step as shown in Figure 5.As shown in Figure 10, this router may include that the 4th reception Module the 1010, the 4th sending module 1020 and second performs module 1030.
Wherein, the connection that the 4th receiver module 1010 sends for receiving the second terminal to be accessed please Asking, this connection request comprises the identification code of the second terminal;4th sending module 1020 is for by above-mentioned Identification code sends to first terminal;Second performs module 1030 for connecing of returning according to first terminal Enter instruction information, perform to set up, with the second terminal, the operation that WIFI is connected.
When the terminal (the second terminal) of new user is intended to add this WIFI network, send out to this router Send connection request, this connection request contains the identification code of the second terminal to be added.4th connects Receive module 1010 and receive the connection request that the second terminal sends.4th sending module 1020 is by this knowledge Other code sends to the first terminal with administrator right.First terminal is according to the identification code received Authenticate, if authentication is passed through, then return to router and access instruction information.Second performs mould Block 1030 performs to set up, with the second terminal, the operation that WIFI is connected according to this access instruction information.
Further, the router that the embodiment of the present invention provides, it is also possible to including: the 4th binding mould Block 1040.4th binding module 1040 is used for carrying out initial setting up, binds with first terminal Operation, determines the administrator right of first terminal.
The router that the embodiment of the present invention provides, by by the authentication process of new user by router Be transferred to the terminal with administrator right, by advance with router binding there is administrator right Terminal be authenticated, it is to avoid the WIFI caused because of password leakage steals even, protects Netowrk tape Wide resource, it is ensured that normal Web vector graphic, improves Consumer's Experience.
One of ordinary skill in the art will appreciate that: realize the whole or portion of above-mentioned each method embodiment Can be completed by the hardware that programmed instruction is relevant step by step.Aforesaid program can be stored in one In computer read/write memory medium.This program upon execution, performs to include that above-mentioned each method is implemented The step of example;And aforesaid storage medium includes: ROM, RAM, magnetic disc or CD etc. are various The medium of program code can be stored.
Last it is noted that various embodiments above is only in order to illustrate technical scheme, and Non-to its restriction;Although the present invention being described in detail with reference to foregoing embodiments, ability The those of ordinary skill in territory is it is understood that it still can be to the technology described in foregoing embodiments Scheme is modified, or the most some or all of technical characteristic is carried out equivalent;And this A little amendments or replacement, do not make the essence of appropriate technical solution depart from various embodiments of the present invention technology The scope of scheme.

Claims (25)

1. a WIFI method of attachment, described method is applied to first terminal, it is characterised in that Including:
The identification code of the second terminal to be accessed that receiving router sends;
Carry out authentication operations according to described identification code, generate authentication result information;
Described authentication result information is sent to described router.
WIFI method of attachment the most according to claim 1, it is characterised in that described basis Described identification code carries out authentication operations, generates authentication result information, including:
Described identification code is shown by display screen;
Based on described identification code, determine whether described second terminal can access;
As described second terminal can access, obtain finger print data, according to described finger print data with pre- Deposit the comparison result of finger print information, generate described authentication result information.
WIFI method of attachment the most according to claim 1, it is characterised in that described basis Described identification code carries out authentication operations, generates authentication result information, including:
Described identification code is shown by display screen;
Based on described identification code, determine whether described second terminal can access;
As described second terminal can access, obtain code data, according to described code data with pre- Put the comparison result of password, generate described authentication result information.
WIFI method of attachment the most according to claim 1, it is characterised in that also include:
Described router is according to described authentication result information, it is determined whether set up with described second terminal WIFI connects.
5. according to the WIFI method of attachment described in any claim in Claims 1-4, its It is characterised by, before the identification code of the second terminal to be accessed sent at described receiving router, Also include:
Described router is carried out initial setting up, carries out bindings with described router, determine institute State the administrator right of first terminal.
6. a WIFI method of attachment, described method is applied to first terminal, it is characterised in that Including:
The identification code of the second terminal to be accessed that receiving router sends;
Authentication operations is carried out according to described identification code;
If authentication is passed through, then sending to described router and access instruction information, described access indicates Information is used for indicating described router to set up WIFI with described second terminal and is connected.
WIFI method of attachment the most according to claim 6, it is characterised in that described basis Described identification code carries out authentication operations, including:
Described identification code is shown by display screen;
Based on described identification code, determine whether described second terminal can access;
As described second terminal can access, obtain finger print data, by described finger print data with prestore Finger print information is compared, if matching, confirming as authentication and passing through, if do not mated, confirming Do not pass through for authentication.
WIFI method of attachment the most according to claim 6, it is characterised in that described basis Described identification code carries out authentication operations, including:
Described identification code is shown by display screen;
Based on described identification code, determine whether described second terminal can access;
As described second terminal can access, obtain code data, by described code data with preset Password is compared, if matching, confirming as authentication and passing through, if do not mated, confirms as mirror Power is not passed through.
9. according to the WIFI method of attachment described in any claim in claim 6 to 8, its It is characterised by, before the identification code of the second terminal to be accessed sent at described receiving router, Also include:
Described router is carried out initial setting up, carries out bindings with described router, determine institute State the administrator right of first terminal.
10. a WIFI method of attachment, described method is applied to router, it is characterised in that bag Include:
Receiving the connection request that second terminal to be accessed sends, described connection request comprises described the The identification code of two terminals;
Described identification code is sent to first terminal;
The authentication result information returned according to described first terminal, it is determined whether with described second terminal Set up WIFI to connect.
11. WIFI methods of attachment according to claim 10, it is characterised in that described Before receiving the connection request that the second terminal to be accessed sends, also include:
Carry out initial setting up, carry out bindings with described first terminal, determine described first terminal Administrator right.
12. 1 kinds of WIFI methods of attachment, described method is applied to router, it is characterised in that bag Include:
Receiving the connection request that second terminal to be accessed sends, described connection request comprises described the The identification code of two terminals;
Described identification code is sent to first terminal;
The access instruction information returned according to described first terminal, performs to set up with described second terminal The operation that WIFI connects.
13. WIFI methods of attachment according to claim 12, it is characterised in that described Before receiving the connection request that the second terminal to be accessed sends, also include:
Carry out initial setting up, carry out bindings with described first terminal, determine described first terminal Administrator right.
14. 1 kinds of terminals, for first terminal, it is characterised in that including:
First receiver module, for the identification code of the second terminal to be accessed that receiving router sends;
First authentication module, enters for the described identification code received according to described first receiver module Row authentication operations, generates authentication result information;
First sending module, for the described authentication result information described first authentication module generated Send to described router.
15. terminals according to claim 14, it is characterised in that described first authentication module Including:
First transmitting element, for showing the transmission of described identification code to display screen;
First authenticating unit, for based on described identification code, determines that described second terminal is the most permissible Access;As described second terminal can access, obtain finger print data, according to described finger print data with The comparison result of pre-stored fingerprint information, generates described authentication result information.
16. terminals according to claim 14, it is characterised in that described first authentication module Including:
Second transmitting element, for showing the transmission of described identification code to display screen;
Second authenticating unit, based on described identification code, determines whether described second terminal can access; As described second terminal can access, it is used for obtaining code data, according to described code data with pre- Put the comparison result of password, generate described authentication result information.
17. according to the terminal described in any claim in claim 14 to 16, and its feature exists In, also include the first binding module, for described router being carried out initial setting up, with described road Carried out bindings by device, determine the administrator right of described first terminal.
18. 1 kinds of terminals, for first terminal, it is characterised in that including:
Second receiver module, for the identification code of the second terminal to be accessed that receiving router sends;
Second authentication module, enters for the described identification code received according to described second receiver module Row authentication operations;
Second sending module, for when authentication by time, to described router send access instruction letter Breath, described access instruction information is used for indicating described router and described second terminal to set up WIFI even Connect.
19. terminal according to claim 18, it is characterised in that described second authentication module Including:
3rd transmitting element, for showing the transmission of described identification code to display screen;
3rd authenticating unit, for based on described identification code, determines that described second terminal is the most permissible Access;As described second terminal can access, obtain finger print data, by described finger print data with pre- Deposit finger print information to compare, if matching, confirming as authentication and passing through, if do not mated, true Think that authentication is not passed through.
20. terminals according to claim 18, it is characterised in that described second authentication module Including:
4th transmitting element, for showing the transmission of described identification code to display screen;
4th authenticating unit, for based on described identification code, determines that described second terminal is the most permissible Access;As described second terminal can access, obtain code data, by described code data with pre- Put password to compare, if matching, confirming as authentication and passing through, if do not mated, confirming as Authentication is not passed through.
21. according to the terminal described in any claim in claim 18 to 20, and its feature exists In, also include the second binding module, for described router being carried out initial setting up, with described road Carried out bindings by device, determine the administrator right of described first terminal.
22. 1 kinds of routers, it is characterised in that including:
3rd receiver module, for receiving the connection request that the second terminal to be accessed sends, described Connection request comprises the identification code of described second terminal;
3rd sending module, for sending described identification code to first terminal;
First performs module, for the authentication result information returned according to described first terminal, determines Whether set up WIFI with described second terminal to be connected.
23. routers according to claim 22, it is characterised in that also include the 3rd binding Module, is used for carrying out initial setting up, carries out bindings with described first terminal, determines described The administrator right of one terminal.
24. 1 kinds of routers, it is characterised in that including:
4th receiver module, for receiving the connection request that the second terminal to be accessed sends, described Connection request comprises the identification code of described second terminal;
4th sending module, for sending described identification code to first terminal;
Second performs module, for the access instruction information returned according to described first terminal, performs The operation that WIFI is connected is set up with described second terminal.
25. routers according to claim 24, it is characterised in that also include the 4th binding Module, is used for carrying out initial setting up, carries out bindings with described first terminal, determines described The administrator right of one terminal.
CN201610281275.6A 2016-04-28 2016-04-28 WIFI connection method, terminal and router Pending CN105848148A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610281275.6A CN105848148A (en) 2016-04-28 2016-04-28 WIFI connection method, terminal and router

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610281275.6A CN105848148A (en) 2016-04-28 2016-04-28 WIFI connection method, terminal and router

Publications (1)

Publication Number Publication Date
CN105848148A true CN105848148A (en) 2016-08-10

Family

ID=56590448

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610281275.6A Pending CN105848148A (en) 2016-04-28 2016-04-28 WIFI connection method, terminal and router

Country Status (1)

Country Link
CN (1) CN105848148A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106658502A (en) * 2016-12-28 2017-05-10 太仓红码软件技术有限公司 Intelligent wireless local area reservation access method based on fingerprint authentication
CN106714175A (en) * 2016-12-30 2017-05-24 哈尔滨安天科技股份有限公司 Fraud-proof wifi access point verification method and system
CN108616859A (en) * 2018-05-11 2018-10-02 珠海云麦科技有限公司 A kind of artificial intelligence management WIFI group network systems

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150089624A1 (en) * 2013-09-23 2015-03-26 Samsung Electronics Co., Ltd. Security management method and apparatus in a home network system
CN104540128A (en) * 2014-12-26 2015-04-22 北京奇虎科技有限公司 Method, device and system for wireless network access
CN104902477A (en) * 2015-06-26 2015-09-09 努比亚技术有限公司 Authentication terminal, wireless router, wireless router connection method and wireless router connection system
CN105516974A (en) * 2015-11-24 2016-04-20 东莞酷派软件技术有限公司 Router connection method, terminal and router

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150089624A1 (en) * 2013-09-23 2015-03-26 Samsung Electronics Co., Ltd. Security management method and apparatus in a home network system
CN104540128A (en) * 2014-12-26 2015-04-22 北京奇虎科技有限公司 Method, device and system for wireless network access
CN104902477A (en) * 2015-06-26 2015-09-09 努比亚技术有限公司 Authentication terminal, wireless router, wireless router connection method and wireless router connection system
CN105516974A (en) * 2015-11-24 2016-04-20 东莞酷派软件技术有限公司 Router connection method, terminal and router

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106658502A (en) * 2016-12-28 2017-05-10 太仓红码软件技术有限公司 Intelligent wireless local area reservation access method based on fingerprint authentication
CN106658502B (en) * 2016-12-28 2020-10-02 西安智财全技术转移中心有限公司 Intelligent wireless local area network reserved access method based on fingerprint authentication
CN106714175A (en) * 2016-12-30 2017-05-24 哈尔滨安天科技股份有限公司 Fraud-proof wifi access point verification method and system
CN108616859A (en) * 2018-05-11 2018-10-02 珠海云麦科技有限公司 A kind of artificial intelligence management WIFI group network systems

Similar Documents

Publication Publication Date Title
JP7403020B2 (en) System and method for second factor authentication of customer support calls
CN112771826B (en) Application program login method, application program login device and mobile terminal
US9025769B2 (en) Method of registering smart phone when accessing security authentication device and method of granting access permission to registered smart phone
CN108462710B (en) Authentication and authorization method, device, authentication server and machine-readable storage medium
EP3099090B1 (en) Network locking or card locking method and device for a mobile terminal, terminal, sim card, storage media
CN103249045A (en) Identification method, device and system
CN107113613B (en) Server, mobile terminal, network real-name authentication system and method
CN110266642A (en) Identity identifying method and server, electronic equipment
US20100042847A1 (en) Method for authentication using one-time identification information and system
CN101986598B (en) Authentication method, server and system
CN105323253A (en) Identity verification method and device
CN106034123A (en) Authentication method, application system server and client
CN109151820A (en) One kind being based on the safety certifying method and device of " one machine of a people, one card No.1 "
CN106488453A (en) A kind of method and system of portal certification
CN105915338A (en) Key generation method and key generation system
CN102333072A (en) Network banking trusted transaction system and method based on intelligent terminal
CN104469736B (en) A kind of data processing method, server and terminal
CN105933886A (en) ESIM number writing method, security system, ESIM number server and terminal
WO2019134494A1 (en) Verification information processing method, communication device, service platform, and storage medium
CN103888429A (en) Virtual machine starting method, correlation devices and systems
CN109977039A (en) HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing
CN101616414A (en) Method, system and server that terminal is authenticated
CN105848148A (en) WIFI connection method, terminal and router
US20210111885A1 (en) Electronic access control multi-factor authentication using centralized hardware secured credential system and methods of use thereof
CN105991619A (en) Safety authentication method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160810

WD01 Invention patent application deemed withdrawn after publication