CN105848148A - WIFI connection method, terminal and router - Google Patents
WIFI connection method, terminal and router Download PDFInfo
- Publication number
- CN105848148A CN105848148A CN201610281275.6A CN201610281275A CN105848148A CN 105848148 A CN105848148 A CN 105848148A CN 201610281275 A CN201610281275 A CN 201610281275A CN 105848148 A CN105848148 A CN 105848148A
- Authority
- CN
- China
- Prior art keywords
- terminal
- identification code
- authentication
- router
- wifi
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
An embodiment of the invention provides a WIFI connection method, a terminal and a router and relates to the field of communication technology. The method is applied to a first terminal and includes receiving an identification code of a to-be-accessed second terminal sent by the router; performing authentication operation according to the identification code and generating authentication result information; sending the authentication result information to the router. According to the embodiment of the invention, a new user authentication process is transferred to the terminal having administrator authority from the router, so that illegal WIFI connection caused by password divulgence can be avoided, network bandwidth resources can be protected, normal network use is ensured and user experience is improved.
Description
Technical field
The present embodiments relate to communication technical field, particularly relate to a kind of WIFI method of attachment, end
End and router.
Background technology
Along with popularizing, more and more of the terminals such as notebook computer, panel computer, smart mobile phone
Terminal uses adopting wireless fidelity technology (WIreless FIdelity;Hereinafter referred to as: WIFI) network.
Traditional WIFI connects, and needs user to search for wireless network in terminal, then inputs password, by
Router authenticates, as long as password is correct, terminal just can be successfully connected.
Inventor is during realizing the present invention, and at least there are the following problems to find prior art:
If WIFI password is by malicious dissemination or cracks, then WIFI is by the most stolen company so that lose net
Network bandwidth resources, the proper network affecting user is used by serious conditions.
Summary of the invention
The embodiment of the present invention provides a kind of WIFI method of attachment, terminal and router, to avoid because of close
The WIFI that code leaks and causes steals even.
For reaching above-mentioned purpose, embodiments provide a kind of WIFI method of attachment, described side
Method is applied to first terminal, including: the identification of the second terminal to be accessed that receiving router sends
Code;Carry out authentication operations according to described identification code, generate authentication result information;By described authentication knot
Really information sends to described router.
The embodiment of the present invention additionally provides a kind of WIFI method of attachment, and described method is applied to first eventually
End, including: the identification code of the second terminal to be accessed that receiving router sends;According to described knowledge
Other code carries out authentication operations;If authentication is passed through, then send to described router and access instruction information,
Described access instruction information is used for indicating described router to set up WIFI with described second terminal and is connected.
The embodiment of the present invention additionally provides a kind of WIFI method of attachment, and described method is applied to route
Device, including: receiving the connection request that the second terminal to be accessed sends, described connection request comprises
The identification code of described second terminal;Described identification code is sent to first terminal;According to described first
The authentication result information that terminal returns, it is determined whether set up WIFI with described second terminal and be connected.
The embodiment of the present invention additionally provides a kind of WIFI method of attachment, and described method is applied to route
Device, including: receiving the connection request that the second terminal to be accessed sends, described connection request comprises
The identification code of described second terminal;Described identification code is sent to first terminal;According to described first
The access instruction information that terminal returns, performs to set up, with described second terminal, the operation that WIFI is connected.
The embodiment of the present invention additionally provides a kind of terminal, for first terminal, including: first receives mould
Block, for the identification code of the second terminal to be accessed that receiving router sends;First authentication module,
Described identification code for receiving according to described first receiver module carries out authentication operations, generates mirror
Power object information;First sending module, for the described authentication described first authentication module generated
Object information sends to described router.
The embodiment of the present invention additionally provides a kind of terminal, for first terminal, including: second receives mould
Block, for the identification code of the second terminal to be accessed that receiving router sends;Second authentication module,
Described identification code for receiving according to described second receiver module carries out authentication operations;Second
Send module, for when authentication by time, to described router send access instruction information, described in connect
Enter instruction information to be connected for indicating described router to set up WIFI with described second terminal.
The embodiment of the present invention additionally provides a kind of router, including: the 3rd receiver module, it is used for connecing
Receiving the connection request that the second terminal to be accessed sends, described connection request comprises described second terminal
Identification code;3rd sending module, for sending described identification code to first terminal;First holds
Row module, for the authentication result information returned according to described first terminal, it is determined whether with described
Second terminal is set up WIFI and is connected.
The embodiment of the present invention additionally provides a kind of router, including: the 4th receiver module, it is used for connecing
Receiving the connection request that the second terminal to be accessed sends, described connection request comprises described second terminal
Identification code;4th sending module, for sending described identification code to first terminal;Second holds
Row module, for the access instruction information returned according to described first terminal, performs and described second
Terminal sets up the operation that WIFI connects.
WIFI method of attachment, terminal and the router that the embodiment of the present invention provides, by using new
The authentication process at family is transferred to the terminal with administrator right by router, it is to avoid because password is let out
The WIFI leaked and cause steals even, protects network bandwidth resources, it is ensured that normal Web vector graphic,
Improve Consumer's Experience.
Accompanying drawing explanation
The method flow diagram of one embodiment of WIFI method of attachment that Fig. 1 provides for the present invention;
The method flow diagram of WIFI another embodiment of method of attachment that Fig. 2 provides for the present invention;
The method flow diagram of WIFI another embodiment of method of attachment that Fig. 3 provides for the present invention;
The method flow diagram of the WIFI method of attachment further embodiment that Fig. 4 provides for the present invention;
The method flow diagram of the WIFI method of attachment a still further embodiment that Fig. 5 provides for the present invention;
The structural representation of one embodiment of terminal that Fig. 6 provides for the present invention;
The structural representation of another embodiment of terminal that Fig. 7 provides for the present invention;
The structural representation of another embodiment of terminal that Fig. 8 provides for the present invention;
The structural representation of one embodiment of router that Fig. 9 provides for the present invention;
The structural representation of another embodiment of router that Figure 10 provides for the present invention.
Description of reference numerals:
610-the first receiver module, 620-the first authentication module, 630-the first sending module, 621-
One transmitting element, 622-the first authenticating unit, 623-the second transmitting element, 624-the second authenticating unit,
640-the first binding module, 810-the second receiver module, 820-the second authentication module, 830-second
Send module, 821-the 3rd transmitting element, 822-the 3rd authenticating unit, 823-the 4th transmitting element, 824-
4th authenticating unit, 840-the second binding module, 910-the 3rd receiver module, 920-the 3rd send mould
Block, 930-first performs module, 940-the 3rd binding module, 1010-the 4th receiver module, 1020-
4th sending module, 1030-second perform module, 1040-the 4th binding module.
Detailed description of the invention
Below in conjunction with the accompanying drawings the method for attachment of embodiment of the present invention WIFI, terminal and router are carried out in detail
Thin description.
Embodiment one
The method flow diagram of one embodiment of WIFI method of attachment that Fig. 1 provides for the present invention, the party
The executive agent of method can be the various terminal devices with administrator right, e.g., notebook computer,
The intelligent digital product such as mobile phone, Pad, it is also possible to for being integrated in the device on these terminal devices or core
Sheet.As it is shown in figure 1, this WIFI method of attachment is applied to first terminal, comprise the steps:
S110, the identification code of the second terminal to be accessed that receiving router sends.
When the terminal (the second terminal to be accessed) of new user is intended to add certain WIFI network, to this
The router of network sends connection request, contains the identification code of the second terminal in this connection request.
There is this identification code that the first terminal receiving router of administrator right sends.Implement in the present invention
In example, the identification code of the second terminal can be that the media interviews of computer control (Medium/Media
Access Control;Hereinafter referred to as: MAC) address or phone number etc..
S120, carries out authentication operations according to this identification code, generates authentication result information.
First terminal authenticates according to the identification code received, and generates authentication result information.
S130, sends above-mentioned authentication result information to router.
Router is according to authentication result information, it is determined whether sets up WIFI with the second terminal and is connected, as
Fruit authentication is passed through, then router performs to set up, with the second terminal, the operation that WIFI is connected;If authentication
Do not pass through, then router performs refusal and sets up, with the second terminal, the operation that WIFI is connected.Illustrate,
The WIFI method of attachment that the embodiment of the present invention provides can apply in hotel WIFI management.Client
Meeting typing phone number when registering, therefore first terminal can be by the phone number of the second terminal
With the number phase comparison of typing during registration, when such a match occurs, authentication is passed through, and performs with second eventually
End sets up the operation that WIFI connects;When both do not mate, perform refusal and set up with the second terminal
The operation that WIFI connects, to prevent non-Hotel Customer from stealing even WIFI.
The WIFI method of attachment that the embodiment of the present invention provides, by by the authentication process of new user by
Router is transferred to the terminal with administrator right, it is to avoid the WIFI caused because of password leakage
The company of robber, protects network bandwidth resources, it is ensured that normal Web vector graphic, improves Consumer's Experience.
Embodiment two
The method flow diagram of WIFI another embodiment of method of attachment that Fig. 2 provides for the present invention.As
Shown in Fig. 2, on the basis of above-described embodiment, the WIFI method of attachment that the present embodiment provides is permissible
Further include steps of
S210, carries out initial setting up to router, carries out bindings with router, determines first
The administrator right of terminal.
When router is carried out initial setting up, a terminal can be selected to bind with router,
Determine the administrator right of this terminal.
S220, the identification code of the second terminal to be accessed that receiving router sends.
S230, shows this identification code by display screen.
After first terminal receives the identification code of the second terminal to be accessed, a management can be triggered
Member's authentication interface, keeper (holder of first terminal) is in the authentication interface shown by display screen
It can be seen that attempt to connect to the identification code of the terminal (that is, the second terminal) of router.
S240, obtains finger print data, according to the comparison result of this finger print data Yu pre-stored fingerprint information,
Generate authentication result information.
Keeper is after authentication interface sees the identification code of the second terminal to be accessed, based on this identification
Code, determines whether the second terminal can access.If agreeing to the second terminal connection route device, then record
Entering fingerprint, the finger print data of typing is compared by first terminal with pre-stored fingerprint information, Liang Zhexiang
Coupling, authentication is passed through.If keeper disagrees the second terminal connection route device, then directly generate
The authentication result information that authentication is not passed through.Or when first terminal is held by non-administrator, non-pipe
The finger print data of reason person's typing does not mates with pre-stored fingerprint information, then authenticate and do not pass through.
Step S240 can also be: obtains code data, according to this code data and presetting cipher
Comparison result, generates authentication result information.In authentication interface, keeper sees that to be accessed second is eventually
After the identification code of end, based on this identification code, determine whether the second terminal can access.If agreed to
Second terminal connection route device, it is also possible to input password, first terminal by this code data with preset
Password is compared, and both match, and authentication is passed through.If keeper disagrees the second terminal even
Connect router, then directly generate the authentication result information that authentication is not passed through.Or when first terminal quilt
When non-administrator holds, non-administrator cannot know correct password, and the password of input is close with preset
Code does not mates, then authenticate and do not pass through.Inputted password by keeper, can avoid disclosing to user close
Code, in order to avoid password is revealed.
S250, sends above-mentioned authentication result information to router.
Router is according to authentication result information, it is determined whether sets up WIFI with the second terminal and is connected, as
Fruit authentication is passed through, then router performs to set up, with the second terminal, the operation that WIFI is connected;If authentication
Do not pass through, then router performs refusal and sets up, with the second terminal, the operation that WIFI is connected.
The WIFI method of attachment that the embodiment of the present invention provides, by by the authentication process of new user by
Router is transferred to the terminal with administrator right, by advance with router binding there is management
The terminal of member's authority carries out fingerprint or cipher authentication, it is to avoid the WIFI caused because of password leakage steals
Even, protect network bandwidth resources, it is ensured that normal Web vector graphic, improve Consumer's Experience.
Embodiment three
The method flow diagram of WIFI another embodiment of method of attachment that Fig. 3 provides for the present invention, should
The executive agent of method can be the terminal with administrator right, it is also possible to have pipe for being integrated in
Device in the terminal of reason person's authority or chip.As it is shown on figure 3, this WIFI method of attachment is applied to
First terminal, comprises the steps:
Step 310, the identification code of the second terminal to be accessed that receiving router sends;
When the terminal (the second terminal) of new user is intended to add certain WIFI network, to the road of this network
Sent connection request by device, this connection request contains the identification code of the second terminal.There is management
This identification code that the first terminal receiving router of member's authority sends.In embodiments of the present invention,
The identification code of two terminals can be MAC Address or the phone number etc. of computer.Router is being entered
During row initial setting up, a terminal can be selected to bind with router, determine the pipe of this terminal
Reason person's authority.
Step 320, carries out authentication operations according to this identification code;
In embodiments of the present invention, step 320 may include that and shows this identification code by display screen;
Based on this identification code, determine whether the second terminal can access;As the second terminal can access, obtain
Print data, compare this finger print data with pre-stored fingerprint information, if matched, true
Think that authentication is passed through, if not mating, confirming as authenticating and not passing through.First terminal receives second
After the identification code of terminal, can trigger an administrator authentication interface, keeper be (first terminal
Holder) in the authentication interface shown by display screen it can be seen that attempt to connect to the terminal of router
The identification code of (that is, the second terminal).If keeper agrees to the second terminal connection route device, then
Typing fingerprint, the finger print data of typing compared by first terminal with pre-stored fingerprint information, both
Matching, authentication is passed through.When first terminal is held by non-administrator, the finger of non-administrator's typing
Line data are not mated with pre-stored fingerprint information, then authenticate and do not pass through.
Further, step 320 can also include: shows this identification code by display screen;Based on
This identification code, determines whether the second terminal can access;As the second terminal can access, obtain close
Code data, compare this code data with presetting cipher, if matched, confirm as authentication
Pass through, if not mating, confirming as authenticating and not passing through.If keeper agrees to the second terminal link road
By device, it is also possible to input password, this code data is compared by first terminal with presetting cipher,
Both match, and authentication is passed through.When first terminal is held by non-administrator, non-administrator cannot
Knowing correct password, the password of input does not mates with presetting cipher, then authenticate and do not pass through.By managing
Reason person inputs password, can avoid to user's open code, in order to avoid password is revealed.
Step 330, if authentication is passed through, then sends to router and accesses instruction information, and this access refers to
Show that information connects for indicating router and the second terminal to set up WIFI.
The WIFI method of attachment that the embodiment of the present invention provides, by by the authentication process of new user by
Router is transferred to the terminal with administrator right, by advance with router binding there is management
The terminal of member's authority carries out fingerprint or cipher authentication, it is to avoid the WIFI caused because of password leakage steals
Even, protect network bandwidth resources, it is ensured that normal Web vector graphic, improve Consumer's Experience.
Embodiment four
The method flow diagram of the WIFI method of attachment further embodiment that Fig. 4 provides for the present invention, should
The executive agent of method can be router, it is also possible to for integrated device on the router or chip.
As shown in Figure 4, this WIFI method of attachment comprises the steps:
Step 410, receives the connection request that the second terminal to be accessed sends, and this connection request comprises
The identification code of the second terminal.
Step 420, sends this identification code to first terminal.
Before step 410, it is also possible to router is carried out initial setting up, carry out with first terminal
Bindings, determines the administrator right of first terminal.Terminal (the second terminal) as new user
When being intended to add this WIFI network, send connection request to this router, this connection request contains
The identification code of the second terminal to be added.This identification code is sent to having administrator right by router
First terminal.
Step 430, the authentication result information returned according to first terminal, it is determined whether with the second terminal
Set up WIFI to connect.
First terminal authenticates according to the identification code received, and generates authentication result information, and will
It is back to router.The authentication result information that router returns according to first terminal, it is determined whether
Setting up WIFI with the second terminal to be connected, if authentication is passed through, then router performs to build with the second terminal
The operation that vertical WIFI connects;If authentication is not passed through, then router performs to refuse to build with the second terminal
The operation that vertical WIFI connects.
The WIFI method of attachment that the embodiment of the present invention provides, by by the authentication process of new user by
Router is transferred to the terminal with administrator right, it is to avoid the WIFI caused because of password leakage
The company of robber, protects network bandwidth resources, it is ensured that normal Web vector graphic, improves Consumer's Experience.
Embodiment five
The method flow diagram of the WIFI method of attachment a still further embodiment that Fig. 5 provides for the present invention, should
The executive agent of method can be router, it is also possible to for integrated device on the router or chip.
As it is shown in figure 5, this WIFI method of attachment comprises the steps:
Step 510, receives the connection request that the second terminal to be accessed sends, and this connection request comprises
The identification code of the second terminal.
Step 520, sends this identification code to first terminal.
Before step 510, it is also possible to router is carried out initial setting up, carry out with first terminal
Bindings, determines the administrator right of first terminal.Terminal (the second terminal) as new user
When being intended to add this WIFI network, send connection request to this router, this connection request contains
The identification code of the second terminal to be added.This identification code is sent to having administrator right by router
First terminal.
Step 530, the access instruction information returned according to first terminal, perform to set up with the second terminal
The operation that WIFI connects.
When first terminal authentication by after, to router return access instruction information, router according to
This access instruction information is set up WIFI with the second terminal and is connected.
The WIFI method of attachment that the embodiment of the present invention provides, by by the authentication process of new user by
Router is transferred to the terminal with administrator right, it is to avoid the WIFI caused because of password leakage
The company of robber, protects network bandwidth resources, it is ensured that normal Web vector graphic, improves Consumer's Experience.
Embodiment six
The structural representation of one embodiment of terminal that Fig. 6 provides for the present invention, can be used for performing such as
Method step shown in Fig. 1.As shown in Figure 6, this terminal is first terminal, including: first connects
Receive module the 610, first authentication module 620 and the first sending module 630.
Wherein, the second terminal to be accessed that the first receiver module 610 sends for receiving router
Identification code;First authentication module 620 is for the identification received according to the first receiver module 610
Code carries out authentication operations, generates authentication result information;First sending module 630 is for reflecting first
The authentication result information that power module 620 generates sends to router.
When the terminal (the second terminal) of new user is intended to add certain WIFI network, to the road of this network
Sent connection request by device, this connection request contains the identification code of the second terminal.First receives
This identification code that module 610 receiving router sends.First authentication module 620 is according to receiving
Identification code authenticates, and generates authentication result information.The authentication that first sending module 630 will generate
Object information sends to router, and router is according to authentication result information, it is determined whether with second eventually
End is set up WIFI and is connected, if authentication is passed through, then router performs to set up WIFI with the second terminal
The operation connected;If authentication is not passed through, then router performs refusal and sets up WIFI with the second terminal
The operation connected.
The terminal that the embodiment of the present invention provides, by being turned by router the authentication process of new user
Move to the terminal with administrator right, it is to avoid the WIFI caused because of password leakage steals even, protects
Protect network bandwidth resources, it is ensured that normal Web vector graphic, improve Consumer's Experience.
Embodiment seven
The structural representation of another embodiment of terminal that Fig. 7 provides for the present invention.As it is shown in fig. 7,
On the basis of above-mentioned embodiment illustrated in fig. 6, the first authentication module 620 may include that first
Send unit 621 and the first authenticating unit 622.
Wherein, the first transmitting element 621 is for showing the transmission of above-mentioned identification code to display screen;
First authenticating unit 622, for based on this identification code, determines whether the second terminal can access;As
Second terminal can access, and obtains finger print data, according to this finger print data and pre-stored fingerprint information
Comparison result, generates authentication result information.
After first receiver module 610 receives the identification code of the second terminal, a management can be triggered
Member's authentication interface, above-mentioned identification code is sent certification circle to display screen by the first transmitting element 621
Face shows, keeper (holder of first terminal) in this authentication interface it can be seen that attempt
It is connected to the identification code of the terminal (that is, the second terminal) of router.Keeper sees in authentication interface
After the identification code of the second terminal to be accessed, if agreeing to the second terminal connection route device, then record
Entering fingerprint, the finger print data of typing is compared by the first authenticating unit 622 with pre-stored fingerprint information,
Both match, and authentication is passed through.If keeper disagrees the second terminal connection route device, then
One authenticating unit 622 directly generates the authentication result information that authentication is not passed through.Or work as first terminal
When being held by non-administrator, the first authenticating unit 622 by the finger print data of non-administrator's typing with pre-
Depositing finger print information to compare, both do not mate, then authenticate and do not pass through.
Further, the first authentication module 620 can also include: the second transmitting element 623 and
Two authenticating unit 624.Wherein, the second transmitting element 623 is for sending above-mentioned identification code to display
Screen shows;Whether second authenticating unit 624, for based on this identification code, determines the second terminal
Can access;As the second terminal can access, obtain code data, according to this code data with pre-
Put the comparison result of password, generate authentication result information.
After first receiver module 610 receives the identification code of the second terminal to be accessed, can trigger
One administrator authentication interface, above-mentioned identification code is sent to display screen by the second transmitting element 623
Authentication interface show, keeper (holder of first terminal) is permissible in this authentication interface
See the identification code of the terminal (that is, the second terminal) attempting to connect to router.Keeper is recognizing
After the identification code of the second terminal to be accessed is seen at card interface, if agreeing to the second terminal connection route
Device, then input password, and the code data of input is carried out by the second authenticating unit 624 with presetting cipher
Comparison, both match, and authentication is passed through.If keeper disagrees the second terminal connection route device,
Then the second authenticating unit 624 directly generates the authentication result information that authentication is not passed through.Or when first
When terminal is held by non-administrator, the code data that non-administrator is inputted by the second authenticating unit 624
Comparing with presetting cipher, both do not mate, then authenticate and do not pass through.Password is inputted by keeper,
Can avoid to user's open code, in order to avoid password is revealed.
The terminal that the embodiment of the present invention provides, it is also possible to including: the first binding module 640.This is first years old
Binding module 640 may be used for router is carried out initial setting up, carries out bindings with router,
Determine the administrator right of this first terminal.
The terminal that the embodiment of the present invention provides, by being turned by router the authentication process of new user
Move to the terminal with administrator right, by advance with router binding there is administrator right
Terminal carries out fingerprint or cipher authentication, it is to avoid the WIFI caused because of password leakage steals even, protection
Network bandwidth resources, it is ensured that normal Web vector graphic, improves Consumer's Experience.
Embodiment eight
The structural representation of another embodiment of terminal that Fig. 8 provides for the present invention.As shown in Figure 8,
Can be used for the method step performed as shown in Figure 3.As shown in Figure 8, this terminal is first terminal,
Including: the second receiver module the 810, second authentication module 820 and the second sending module 830.Wherein,
The identification code of the second terminal to be accessed that the second receiver module 810 sends for receiving router;
Second authentication module 820 authenticates for the identification code received according to the second receiver module 810
Operation;Second sending module 830 for when authentication by time, send to router and access instruction letter
Breath, this access instruction information is used for indicating router and the second terminal to set up WIFI and connects.
When the terminal (the second terminal) of new user is intended to add certain WIFI network, to the road of this network
Sent connection request by device, this connection request contains the identification code of the second terminal to be added.
This identification code that second receiver module 810 receiving router sends.Second authentication module 820 basis
The identification code received carries out authentication operations.When authentication by time, the second sending module 830 is to road
Being sent by device and access instruction information, router performs to set up, with the second terminal, the operation that WIFI is connected.
In embodiments of the present invention, the second authentication module 820 may include that the 3rd transmitting element 821
With the 3rd authenticating unit 822.Wherein, the 3rd transmitting element 821 is for sending above-mentioned identification code extremely
Display screen shows;3rd authenticating unit 822, for based on this identification code, determines the second terminal
Whether can access;As the second terminal can access, obtain finger print data, by this finger print data with
Pre-stored fingerprint information is compared, if matching, confirming as authentication and passing through, if do not mated,
Confirm as authenticating and do not pass through.
After second receiver module 810 receives the identification code of the second terminal to be accessed, can trigger
One administrator authentication interface, above-mentioned identification code is sent to display screen by the 3rd transmitting element 821
Authentication interface show, keeper (holder of first terminal) is permissible in this authentication interface
See the identification code of the terminal (that is, the second terminal) attempting to connect to router.Keeper is recognizing
After the identification code of the second terminal to be accessed is seen at card interface, if agreeing to the second terminal connection route
Device, then typing fingerprint, the 3rd authenticating unit 822 is by the finger print data of typing and pre-stored fingerprint information
Comparing, both match, and authentication is passed through.When first terminal is held by non-administrator, the
The finger print data of non-administrator's typing is compared by three authenticating unit 822 with pre-stored fingerprint information,
Both do not mate, then authenticate and do not pass through.
Second authentication module 820 can also include: the 4th transmitting element 823 and the 4th authenticating unit
824.Wherein, the 4th transmitting element 823 is for showing the transmission of above-mentioned identification code to display screen;
4th authenticating unit 824, for based on this identification code, determines whether the second terminal can access;As
Second terminal can access, and obtains code data, is compared with presetting cipher by this code data,
If matching, confirming as authentication and passing through, if not mating, confirming as authenticating and not passing through.
After second receiver module 810 receives the identification code of the second terminal to be accessed, can trigger
One administrator authentication interface, above-mentioned identification code is sent to display screen by the 4th transmitting element 823
Authentication interface show, keeper (holder of first terminal) is permissible in this authentication interface
See the identification code of the terminal (that is, the second terminal) attempting to connect to router.Keeper is recognizing
After the identification code of the second terminal to be accessed is seen at card interface, if agreeing to the second terminal connection route
Device, then input password, and the code data of input is carried out by the 4th authenticating unit 824 with presetting cipher
Comparison, both match, and authentication is passed through.When first terminal is held by non-administrator, the 4th mirror
The code data that non-administrator inputs is compared by power unit 824 with presetting cipher, and both are not
Join, then authenticate and do not pass through.Inputted password by keeper, can avoid to user's open code, with
Exempt from password to reveal.
Further, the terminal that the embodiment of the present invention provides, it is also possible to including: the second binding module
840.This second binding module 840 may be used for router is carried out initial setting up, enters with router
Row bindings, determines the administrator right of first terminal.
The terminal that the embodiment of the present invention provides, by being turned by router the authentication process of new user
Move to the terminal with administrator right, by advance with router binding there is administrator right
Terminal carries out fingerprint or cipher authentication, it is to avoid the WIFI caused because of password leakage steals even, protection
Network bandwidth resources, it is ensured that normal Web vector graphic, improves Consumer's Experience.
Embodiment nine
The structural representation of one embodiment of router that Fig. 9 provides for the present invention, can be used for performing
Method step as shown in Figure 4.As it is shown in figure 9, this router may include that the 3rd reception mould
Block the 910, the 3rd sending module 920 and first performs module 930.
Wherein, the connection that the 3rd receiver module 910 sends for receiving the second terminal to be accessed please
Asking, this connection request comprises the identification code of the second terminal;3rd sending module 920 is for by above-mentioned
Identification code sends to first terminal;First performs module 930 for the mirror returned according to first terminal
Power object information, it is determined whether set up with above-mentioned second terminal and be connected WIFI connection.
When terminal (the second terminal) WIFI network to be added of new user, send to this router
Connection request, contains the identification code of the second terminal in this connection request.3rd receiver module 910
Receiving the connection request that the second terminal sends, this identification code is sent to tool by the 3rd sending module 920
There is the first terminal of administrator right.First terminal authenticates according to the identification code received, raw
Become authentication result information, and return it to router.If authentication is passed through, then first perform mould
Block 930 performs to set up, with the second terminal, the operation that WIFI is connected;If authentication is not passed through, then first
Perform module 930 to perform to refuse to set up, with the second terminal, the operation that WIFI is connected.
Further, the router that the present embodiment provides can also include: the 3rd binding module 940.
3rd binding module 940 is used for carrying out initial setting up, carries out bindings with first terminal, really
Determine the administrator right of first terminal.
The router that the embodiment of the present invention provides, by by the authentication process of new user by router
Be transferred to the terminal with administrator right, by advance with router binding there is administrator right
Terminal be authenticated, it is to avoid the WIFI caused because of password leakage steals even, protects Netowrk tape
Wide resource, it is ensured that normal Web vector graphic, improves Consumer's Experience.
Embodiment ten
The structural representation of another embodiment of router that Figure 10 provides for the present invention, can be used for holding
Row method step as shown in Figure 5.As shown in Figure 10, this router may include that the 4th reception
Module the 1010, the 4th sending module 1020 and second performs module 1030.
Wherein, the connection that the 4th receiver module 1010 sends for receiving the second terminal to be accessed please
Asking, this connection request comprises the identification code of the second terminal;4th sending module 1020 is for by above-mentioned
Identification code sends to first terminal;Second performs module 1030 for connecing of returning according to first terminal
Enter instruction information, perform to set up, with the second terminal, the operation that WIFI is connected.
When the terminal (the second terminal) of new user is intended to add this WIFI network, send out to this router
Send connection request, this connection request contains the identification code of the second terminal to be added.4th connects
Receive module 1010 and receive the connection request that the second terminal sends.4th sending module 1020 is by this knowledge
Other code sends to the first terminal with administrator right.First terminal is according to the identification code received
Authenticate, if authentication is passed through, then return to router and access instruction information.Second performs mould
Block 1030 performs to set up, with the second terminal, the operation that WIFI is connected according to this access instruction information.
Further, the router that the embodiment of the present invention provides, it is also possible to including: the 4th binding mould
Block 1040.4th binding module 1040 is used for carrying out initial setting up, binds with first terminal
Operation, determines the administrator right of first terminal.
The router that the embodiment of the present invention provides, by by the authentication process of new user by router
Be transferred to the terminal with administrator right, by advance with router binding there is administrator right
Terminal be authenticated, it is to avoid the WIFI caused because of password leakage steals even, protects Netowrk tape
Wide resource, it is ensured that normal Web vector graphic, improves Consumer's Experience.
One of ordinary skill in the art will appreciate that: realize the whole or portion of above-mentioned each method embodiment
Can be completed by the hardware that programmed instruction is relevant step by step.Aforesaid program can be stored in one
In computer read/write memory medium.This program upon execution, performs to include that above-mentioned each method is implemented
The step of example;And aforesaid storage medium includes: ROM, RAM, magnetic disc or CD etc. are various
The medium of program code can be stored.
Last it is noted that various embodiments above is only in order to illustrate technical scheme, and
Non-to its restriction;Although the present invention being described in detail with reference to foregoing embodiments, ability
The those of ordinary skill in territory is it is understood that it still can be to the technology described in foregoing embodiments
Scheme is modified, or the most some or all of technical characteristic is carried out equivalent;And this
A little amendments or replacement, do not make the essence of appropriate technical solution depart from various embodiments of the present invention technology
The scope of scheme.
Claims (25)
1. a WIFI method of attachment, described method is applied to first terminal, it is characterised in that
Including:
The identification code of the second terminal to be accessed that receiving router sends;
Carry out authentication operations according to described identification code, generate authentication result information;
Described authentication result information is sent to described router.
WIFI method of attachment the most according to claim 1, it is characterised in that described basis
Described identification code carries out authentication operations, generates authentication result information, including:
Described identification code is shown by display screen;
Based on described identification code, determine whether described second terminal can access;
As described second terminal can access, obtain finger print data, according to described finger print data with pre-
Deposit the comparison result of finger print information, generate described authentication result information.
WIFI method of attachment the most according to claim 1, it is characterised in that described basis
Described identification code carries out authentication operations, generates authentication result information, including:
Described identification code is shown by display screen;
Based on described identification code, determine whether described second terminal can access;
As described second terminal can access, obtain code data, according to described code data with pre-
Put the comparison result of password, generate described authentication result information.
WIFI method of attachment the most according to claim 1, it is characterised in that also include:
Described router is according to described authentication result information, it is determined whether set up with described second terminal
WIFI connects.
5. according to the WIFI method of attachment described in any claim in Claims 1-4, its
It is characterised by, before the identification code of the second terminal to be accessed sent at described receiving router,
Also include:
Described router is carried out initial setting up, carries out bindings with described router, determine institute
State the administrator right of first terminal.
6. a WIFI method of attachment, described method is applied to first terminal, it is characterised in that
Including:
The identification code of the second terminal to be accessed that receiving router sends;
Authentication operations is carried out according to described identification code;
If authentication is passed through, then sending to described router and access instruction information, described access indicates
Information is used for indicating described router to set up WIFI with described second terminal and is connected.
WIFI method of attachment the most according to claim 6, it is characterised in that described basis
Described identification code carries out authentication operations, including:
Described identification code is shown by display screen;
Based on described identification code, determine whether described second terminal can access;
As described second terminal can access, obtain finger print data, by described finger print data with prestore
Finger print information is compared, if matching, confirming as authentication and passing through, if do not mated, confirming
Do not pass through for authentication.
WIFI method of attachment the most according to claim 6, it is characterised in that described basis
Described identification code carries out authentication operations, including:
Described identification code is shown by display screen;
Based on described identification code, determine whether described second terminal can access;
As described second terminal can access, obtain code data, by described code data with preset
Password is compared, if matching, confirming as authentication and passing through, if do not mated, confirms as mirror
Power is not passed through.
9. according to the WIFI method of attachment described in any claim in claim 6 to 8, its
It is characterised by, before the identification code of the second terminal to be accessed sent at described receiving router,
Also include:
Described router is carried out initial setting up, carries out bindings with described router, determine institute
State the administrator right of first terminal.
10. a WIFI method of attachment, described method is applied to router, it is characterised in that bag
Include:
Receiving the connection request that second terminal to be accessed sends, described connection request comprises described the
The identification code of two terminals;
Described identification code is sent to first terminal;
The authentication result information returned according to described first terminal, it is determined whether with described second terminal
Set up WIFI to connect.
11. WIFI methods of attachment according to claim 10, it is characterised in that described
Before receiving the connection request that the second terminal to be accessed sends, also include:
Carry out initial setting up, carry out bindings with described first terminal, determine described first terminal
Administrator right.
12. 1 kinds of WIFI methods of attachment, described method is applied to router, it is characterised in that bag
Include:
Receiving the connection request that second terminal to be accessed sends, described connection request comprises described the
The identification code of two terminals;
Described identification code is sent to first terminal;
The access instruction information returned according to described first terminal, performs to set up with described second terminal
The operation that WIFI connects.
13. WIFI methods of attachment according to claim 12, it is characterised in that described
Before receiving the connection request that the second terminal to be accessed sends, also include:
Carry out initial setting up, carry out bindings with described first terminal, determine described first terminal
Administrator right.
14. 1 kinds of terminals, for first terminal, it is characterised in that including:
First receiver module, for the identification code of the second terminal to be accessed that receiving router sends;
First authentication module, enters for the described identification code received according to described first receiver module
Row authentication operations, generates authentication result information;
First sending module, for the described authentication result information described first authentication module generated
Send to described router.
15. terminals according to claim 14, it is characterised in that described first authentication module
Including:
First transmitting element, for showing the transmission of described identification code to display screen;
First authenticating unit, for based on described identification code, determines that described second terminal is the most permissible
Access;As described second terminal can access, obtain finger print data, according to described finger print data with
The comparison result of pre-stored fingerprint information, generates described authentication result information.
16. terminals according to claim 14, it is characterised in that described first authentication module
Including:
Second transmitting element, for showing the transmission of described identification code to display screen;
Second authenticating unit, based on described identification code, determines whether described second terminal can access;
As described second terminal can access, it is used for obtaining code data, according to described code data with pre-
Put the comparison result of password, generate described authentication result information.
17. according to the terminal described in any claim in claim 14 to 16, and its feature exists
In, also include the first binding module, for described router being carried out initial setting up, with described road
Carried out bindings by device, determine the administrator right of described first terminal.
18. 1 kinds of terminals, for first terminal, it is characterised in that including:
Second receiver module, for the identification code of the second terminal to be accessed that receiving router sends;
Second authentication module, enters for the described identification code received according to described second receiver module
Row authentication operations;
Second sending module, for when authentication by time, to described router send access instruction letter
Breath, described access instruction information is used for indicating described router and described second terminal to set up WIFI even
Connect.
19. terminal according to claim 18, it is characterised in that described second authentication module
Including:
3rd transmitting element, for showing the transmission of described identification code to display screen;
3rd authenticating unit, for based on described identification code, determines that described second terminal is the most permissible
Access;As described second terminal can access, obtain finger print data, by described finger print data with pre-
Deposit finger print information to compare, if matching, confirming as authentication and passing through, if do not mated, true
Think that authentication is not passed through.
20. terminals according to claim 18, it is characterised in that described second authentication module
Including:
4th transmitting element, for showing the transmission of described identification code to display screen;
4th authenticating unit, for based on described identification code, determines that described second terminal is the most permissible
Access;As described second terminal can access, obtain code data, by described code data with pre-
Put password to compare, if matching, confirming as authentication and passing through, if do not mated, confirming as
Authentication is not passed through.
21. according to the terminal described in any claim in claim 18 to 20, and its feature exists
In, also include the second binding module, for described router being carried out initial setting up, with described road
Carried out bindings by device, determine the administrator right of described first terminal.
22. 1 kinds of routers, it is characterised in that including:
3rd receiver module, for receiving the connection request that the second terminal to be accessed sends, described
Connection request comprises the identification code of described second terminal;
3rd sending module, for sending described identification code to first terminal;
First performs module, for the authentication result information returned according to described first terminal, determines
Whether set up WIFI with described second terminal to be connected.
23. routers according to claim 22, it is characterised in that also include the 3rd binding
Module, is used for carrying out initial setting up, carries out bindings with described first terminal, determines described
The administrator right of one terminal.
24. 1 kinds of routers, it is characterised in that including:
4th receiver module, for receiving the connection request that the second terminal to be accessed sends, described
Connection request comprises the identification code of described second terminal;
4th sending module, for sending described identification code to first terminal;
Second performs module, for the access instruction information returned according to described first terminal, performs
The operation that WIFI is connected is set up with described second terminal.
25. routers according to claim 24, it is characterised in that also include the 4th binding
Module, is used for carrying out initial setting up, carries out bindings with described first terminal, determines described
The administrator right of one terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610281275.6A CN105848148A (en) | 2016-04-28 | 2016-04-28 | WIFI connection method, terminal and router |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610281275.6A CN105848148A (en) | 2016-04-28 | 2016-04-28 | WIFI connection method, terminal and router |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105848148A true CN105848148A (en) | 2016-08-10 |
Family
ID=56590448
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610281275.6A Pending CN105848148A (en) | 2016-04-28 | 2016-04-28 | WIFI connection method, terminal and router |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105848148A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106658502A (en) * | 2016-12-28 | 2017-05-10 | 太仓红码软件技术有限公司 | Intelligent wireless local area reservation access method based on fingerprint authentication |
CN106714175A (en) * | 2016-12-30 | 2017-05-24 | 哈尔滨安天科技股份有限公司 | Fraud-proof wifi access point verification method and system |
CN108616859A (en) * | 2018-05-11 | 2018-10-02 | 珠海云麦科技有限公司 | A kind of artificial intelligence management WIFI group network systems |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150089624A1 (en) * | 2013-09-23 | 2015-03-26 | Samsung Electronics Co., Ltd. | Security management method and apparatus in a home network system |
CN104540128A (en) * | 2014-12-26 | 2015-04-22 | 北京奇虎科技有限公司 | Method, device and system for wireless network access |
CN104902477A (en) * | 2015-06-26 | 2015-09-09 | 努比亚技术有限公司 | Authentication terminal, wireless router, wireless router connection method and wireless router connection system |
CN105516974A (en) * | 2015-11-24 | 2016-04-20 | 东莞酷派软件技术有限公司 | Router connection method, terminal and router |
-
2016
- 2016-04-28 CN CN201610281275.6A patent/CN105848148A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150089624A1 (en) * | 2013-09-23 | 2015-03-26 | Samsung Electronics Co., Ltd. | Security management method and apparatus in a home network system |
CN104540128A (en) * | 2014-12-26 | 2015-04-22 | 北京奇虎科技有限公司 | Method, device and system for wireless network access |
CN104902477A (en) * | 2015-06-26 | 2015-09-09 | 努比亚技术有限公司 | Authentication terminal, wireless router, wireless router connection method and wireless router connection system |
CN105516974A (en) * | 2015-11-24 | 2016-04-20 | 东莞酷派软件技术有限公司 | Router connection method, terminal and router |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106658502A (en) * | 2016-12-28 | 2017-05-10 | 太仓红码软件技术有限公司 | Intelligent wireless local area reservation access method based on fingerprint authentication |
CN106658502B (en) * | 2016-12-28 | 2020-10-02 | 西安智财全技术转移中心有限公司 | Intelligent wireless local area network reserved access method based on fingerprint authentication |
CN106714175A (en) * | 2016-12-30 | 2017-05-24 | 哈尔滨安天科技股份有限公司 | Fraud-proof wifi access point verification method and system |
CN108616859A (en) * | 2018-05-11 | 2018-10-02 | 珠海云麦科技有限公司 | A kind of artificial intelligence management WIFI group network systems |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7403020B2 (en) | System and method for second factor authentication of customer support calls | |
CN112771826B (en) | Application program login method, application program login device and mobile terminal | |
US9025769B2 (en) | Method of registering smart phone when accessing security authentication device and method of granting access permission to registered smart phone | |
CN108462710B (en) | Authentication and authorization method, device, authentication server and machine-readable storage medium | |
EP3099090B1 (en) | Network locking or card locking method and device for a mobile terminal, terminal, sim card, storage media | |
CN103249045A (en) | Identification method, device and system | |
CN107113613B (en) | Server, mobile terminal, network real-name authentication system and method | |
CN110266642A (en) | Identity identifying method and server, electronic equipment | |
US20100042847A1 (en) | Method for authentication using one-time identification information and system | |
CN101986598B (en) | Authentication method, server and system | |
CN105323253A (en) | Identity verification method and device | |
CN106034123A (en) | Authentication method, application system server and client | |
CN109151820A (en) | One kind being based on the safety certifying method and device of " one machine of a people, one card No.1 " | |
CN106488453A (en) | A kind of method and system of portal certification | |
CN105915338A (en) | Key generation method and key generation system | |
CN102333072A (en) | Network banking trusted transaction system and method based on intelligent terminal | |
CN104469736B (en) | A kind of data processing method, server and terminal | |
CN105933886A (en) | ESIM number writing method, security system, ESIM number server and terminal | |
WO2019134494A1 (en) | Verification information processing method, communication device, service platform, and storage medium | |
CN103888429A (en) | Virtual machine starting method, correlation devices and systems | |
CN109977039A (en) | HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing | |
CN101616414A (en) | Method, system and server that terminal is authenticated | |
CN105848148A (en) | WIFI connection method, terminal and router | |
US20210111885A1 (en) | Electronic access control multi-factor authentication using centralized hardware secured credential system and methods of use thereof | |
CN105991619A (en) | Safety authentication method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160810 |
|
WD01 | Invention patent application deemed withdrawn after publication |