CN108834142A - Wireless router and its connection authentication method - Google Patents
Wireless router and its connection authentication method Download PDFInfo
- Publication number
- CN108834142A CN108834142A CN201810418961.2A CN201810418961A CN108834142A CN 108834142 A CN108834142 A CN 108834142A CN 201810418961 A CN201810418961 A CN 201810418961A CN 108834142 A CN108834142 A CN 108834142A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- authentication
- connect
- determining
- connection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention belongs to wireless communication technique field, in particular to a kind of wireless router and its connection authentication method, connecting authentication method includes:The connection request that mobile terminal is sent is received, judges whether to need cipher authentication, otherwise refusal is connect with mobile terminal;It is to judge whether mobile terminal is to connect for the first time, it is then to send re-authentication prompt to mobile terminal, judge whether mobile terminal passes through re-authentication, it is then to be connect with mobile terminal, otherwise refusal is connect with mobile terminal, when determining is not to connect for the first time, then hold the network type for obtaining mobile terminal connection, judge whether the authentication information of mobile terminal is effective according to network type, when determining invalid, it returns and executes re-authentication, when determining effective, then it is connect with mobile terminal, technical solution of the present invention is when wireless router is connect with mobile terminal, by repeatedly being authenticated, it is possible to prevente effectively from security risk caused by being cracked because of WiFi password cracking software to password.
Description
Technical field
The invention belongs to wireless communication technique field, in particular to a kind of wireless router and its connection authentication method.
Background technique
Wireless network is ubiquitous, also constitutes great hidden danger to information security while facilitating user, such as
The WiFi skeleton key of news report reveals the problem of user WiFi password, and the password of consumer wireless device is allowed to perform practically no function.Such as
Where allow user to have good safety guarantee while facilitating access hotspot, is all numerous wireless device manufacturers all the time
The problem of must be taken into consideration.
Usual commercial wireless solution can all use the certification mode based on 802.1x agreement, and safety is higher, still
802.1x agreement is used to need to dispose certificate server, equipment installation is complex, and household radio equipment will not usually use
The certification mode of 802.1x agreement, and household radio equipment usually requires to meet convenient and safe characteristic, but WiFi password is shared
Software makes people impossible to guard against, can pole if guest is mounted with that WiFi password shares software while accessing household radio equipment
Big harm user information safety.
Summary of the invention
The purpose of the present invention is to provide a kind of wireless router and its connection authentication methods, realize when mobile terminal connects
The safety of wireless router is improved when entering wireless router.
The invention is realized in this way first aspect present invention provides a kind of connection authentication method of wireless router, institute
Stating connection authentication method includes:
Step A. receives the connection request that mobile terminal is sent, and judges whether to need cipher authentication, when needing cipher authentication
When, B is thened follow the steps, when not needing cipher authentication, thens follow the steps C;
Step B. sends cipher authentication prompt to the mobile terminal, receives the password that the mobile terminal is sent and judgement
Whether the password passes through cipher authentication, when determining to pass through cipher authentication, thens follow the steps C, when judgement is not recognized by password
When card, then refusal is connect with the mobile terminal;
Step C. judges whether the mobile terminal is to connect for the first time, when determining is to connect for the first time, thens follow the steps D,
When determining is not to connect for the first time, E is thened follow the steps;
Step D. sends re-authentication prompt to the mobile terminal, judges whether the mobile terminal passes through and secondary recognizes
Card, when determine pass through re-authentication when, then connect with the mobile terminal, when determine do not pass through re-authentication when, then refusal and
The mobile terminal connection;
Step E. obtains the network type of the mobile terminal connection, judges the mobile terminal according to the network type
Authentication information it is whether effective, when determining invalid, return and execute the step D, when determining effective, then with it is described it is mobile eventually
End connection.
Second aspect of the present invention provides a kind of wireless router, the wireless router include connection request receiving module,
Cipher authentication detection module, cipher authentication judgment module, first connection judgment module, re-authentication judgment module and certification letter
Cease judgment module;
The connection request receiving module is used to receive the connection request of mobile terminal transmission;
The cipher authentication detection module when needing cipher authentication, then drives for judging whether to need cipher authentication
The cipher authentication judgment module work then drives the first connection judgment module to work when not needing cipher authentication;
The cipher authentication judgment module is used to send cipher authentication prompt to the mobile terminal, receives the movement eventually
It holds the password sent and judges whether the password passes through cipher authentication, when determining to pass through cipher authentication, then drive the head
Secondary connection judgment module work, when determining not pass through cipher authentication, then refusal is connect with the mobile terminal;
The first connection judgment module is for judging whether the mobile terminal is to connect for the first time, when judgement is to connect for the first time
When connecing, then the re-authentication judgment module is driven to work, when determining is not to connect for the first time, then the authentication information is driven to sentence
Disconnected module work;
The re-authentication judgment module is used to send re-authentication prompt to the mobile terminal, judges described mobile whole
Whether end is then connect with the mobile terminal by re-authentication when determining to pass through re-authentication, secondary when determining not pass through
When certification, then refusal is connect with the mobile terminal;
The authentication information judgment module is used to obtain the network type of the mobile terminal connection, according to the network class
Type judges whether the authentication information of the mobile terminal is effective, when determining invalid, then drives the re-authentication judgment module
It reworks, when determining effective, is then connect with the mobile terminal.
The present invention provides a kind of wireless router and its connection authentication method, and connection authentication method includes:It receives mobile whole
Hold send connection request, judge whether to need cipher authentication, when determine do not pass through cipher authentication when, then refusal and mobile terminal
Connection;When determining to pass through cipher authentication, then judge whether mobile terminal is to connect for the first time, when determining is to connect for the first time, then
Re-authentication prompt is sent to mobile terminal, judges whether mobile terminal passes through re-authentication, when determining to pass through re-authentication,
It is then connect with mobile terminal, when determining not pass through re-authentication, then refusal is connect with mobile terminal, when judgement is not to connect for the first time
When connecing, then the network type for obtaining mobile terminal connection is held, judges whether the authentication information of mobile terminal has according to network type
Effect returns when determining invalid and executes re-authentication, when determining effective, then connect with mobile terminal, technical solution of the present invention
When wireless router is connect with mobile terminal, by repeatedly being authenticated, it is possible to prevente effectively from because of WiFi password cracking software pair
The password of wireless router carries out cracking caused security risk.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art
Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some
Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these
Attached drawing obtains other attached drawings.
Fig. 1 is the flow chart of the connection authentication method for the wireless router that an embodiment of the present invention provides;
Fig. 2 is the specific of the step S30 in the connection authentication method for the wireless router that an embodiment of the present invention provides
Flow chart;
Fig. 3 is the specific of the step S50 in the connection authentication method for the wireless router that an embodiment of the present invention provides
Flow chart;
Fig. 4 is the specific of the step S501 in the connection authentication method for the wireless router that an embodiment of the present invention provides
Flow chart;
Fig. 5 is a kind of reality of step S60 in the connection authentication method for the wireless router that an embodiment of the present invention provides
Apply the specific flow chart of mode;
Fig. 6 is that the step S60 in the connection authentication method for the wireless router that an embodiment of the present invention provides is another
The specific flow chart of embodiment;
Fig. 7 is the general flow chart of the connection authentication method for the wireless router that an embodiment of the present invention provides;
Fig. 8 is the access process figure for the first time of the connection authentication method for the wireless router that an embodiment of the present invention provides;
Fig. 9 is the access process figure again of the connection authentication method for the wireless router that an embodiment of the present invention provides;
Figure 10 is the structural schematic diagram for the wireless router that an embodiment of the present invention provides.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
In order to illustrate technical solution of the present invention, the following is a description of specific embodiments.
Embodiment 1
The embodiment of the present invention 1 provides a kind of connection authentication method of wireless router, as shown in Figure 1, the connection authenticates
Method includes:
Step S10. receives the connection request that mobile terminal is sent, and judges whether to need cipher authentication, when needing password to recognize
When card, S20 is thened follow the steps, when not needing cipher authentication, thens follow the steps S30.
In step slo, the region where mobile terminal enters wireless router, to nothing when detecting wireless router
Line router sends connection request signal, and wireless router judges whether to be provided with password authentification function according to connection request signal
Can, if user setting cryptographic authorization functions, need to verify password, if user setting connects for no password,
It does not need then to be verified.
Step S20. sends cipher authentication prompt to the mobile terminal, receives the password that the mobile terminal is sent and sentences
Whether the password that breaks passes through cipher authentication, when determining to pass through cipher authentication, thens follow the steps S30, obstructed overstocked when determining
When code authentication, S40 is thened follow the steps, refusal is connect with the mobile terminal.
In step S20, when wireless router detects user setting cryptographic authorization functions, sent to the mobile terminal
Cipher authentication prompt, can show interface for password input on mobile terminals, and after user inputs password, wireless router is received
Password is simultaneously compared with preset password, when identical as preset password, is determined through password authentification, perform the next step it is rapid, with
Preset password difference is then refused to connect with mobile terminal.
Step S30. judges whether the mobile terminal is to connect for the first time, when determining is to connect for the first time, thens follow the steps
S50 thens follow the steps S60 when determining is not to connect for the first time.
In step s 30, connection refers to mobile terminal and wireless router First Contact Connections for the first time, works as First Contact Connections
When, the information of wireless router meeting memory mobile terminal can judge whether mobile terminal is for the first time according to the information stored
Connection.
As a kind of embodiment of step S30, as shown in Fig. 2, judging whether the mobile terminal is to connect for the first time, wrap
It includes:
Whether step S301. judges in stored white list to include mobile terminal, when determining result is to be, then execute
Step S302, judgement are to connect for the first time, when it is no for determining result, then follow the steps S303, judgement is not to connect for the first time.
Wherein, white list refers to the list of memory mobile terminal, is can determine whether according to white list to connect for the first time.
Step S50. sends re-authentication prompt to the mobile terminal, judges whether the mobile terminal passes through and secondary recognizes
Card thens follow the steps S70, connect with the mobile terminal when determining to pass through re-authentication, when judgement does not pass through re-authentication
When, S40 is thened follow the steps, refusal is connect with the mobile terminal.
In step s 50, re-authentication prompt refers to other authentication modes other than cipher authentication, for example, distance
Certification, bluetooth authentication or authentification of message etc., distance certification refer to the distance between mobile terminal and wireless router certain
In range, bluetooth authentication, which refers to, carries out Bluetooth pairing between mobile terminal and wireless router, authentification of message refers to mobile terminal
The information of wireless router transmission can be received.
As a kind of embodiment of step S50, as shown in figure 3, sending re-authentication prompt to the mobile terminal, sentence
Whether the mobile terminal that breaks passes through re-authentication, including:
Step S501. sends the prompt of the close wireless router to the mobile terminal, judges the mobile terminal
Whether in pre-determined distance, when determining result is to be, S502 is thened follow the steps, determines that the mobile terminal is recognized by secondary
Card, the mobile terminal is added in white list;When it is no for determining result, S503 is thened follow the steps, determines the movement
Terminal does not pass through re-authentication.
In step S501, wireless router sends information to mobile terminal, shows that mobile terminal on the screen close
The wireless router, to detect the distance between wireless router and mobile terminal, when wireless router and mobile terminal it
Between when being closer, then determine clear between wireless router and mobile terminal, i.e., it is believed that mobile terminal is in user
Family in, it can further determine the mobile terminal be legal mobile terminal.
In this step, by judging the distance between wireless router and mobile terminal, realizes and judge that mobile terminal is
It is no in user's family, and then realize the judgement to mobile terminal validity.
As a kind of embodiment of step S501, as shown in figure 4, judging the mobile terminal whether in pre-determined distance
It is interior, including:
Whether the change rate of step S5011. detection received signal strength is greater than preset value, when determining result is to be, then
Step S5012 is executed, determines that the mobile terminal in pre-determined distance, when it is no for determining result, thens follow the steps S5013,
Determine the mobile terminal not in pre-determined distance.
In step S5011, the principle for detecting the change rate of received signal strength is as follows:General wireless router all can
RSSI (the Received Signal Strength of mobile terminal is obtained from the interactive process with mobile terminal
The instruction of Indication received signal intensity), the transmission power of wireless signal and the relationship received between power can use public affairs
Formula PR=PT/rn indicates that PR is the reception power of wireless signal, and PT is the transmission power of wireless signal, and r is between Transmit-Receive Unit
Distance, n is propagation factor, and numerical values recited depends on the environment of radio signal propagation, by logarithm operation and is substituted into fixed
Available formula PR (the dBm)=A-10nlgr of transmission power constant A can learn the variation of RSSI show STA and AP away from
From distance, in the case where A and n is constant, the variation of the smaller RSSI of distance is bigger, under certain circumstances according to this characteristic
The condition of RSSI value significant change can be met, to judge STA's and AP according to experiment one lesser distance of testing setup
Distance in a certain range, according to the distance (intermediate clear) of STA and AP may determine that STA whether in the family of user,
It can distinguish whether the user is legal STA using this characteristic, in this step, pass through the RSSI of detection mobile terminal, it is real
The detection of distance between mobile terminal and wireless router is showed.
Step S60. obtains the network type of the mobile terminal connection, is judged according to the network type described mobile whole
Whether the authentication information at end is effective, when determining invalid, returns and executes the step S50, when determining effective, thens follow the steps
S70 is connect with the mobile terminal.
In step S60, network type refers to the network type that wireless router is opened according to user setting, network class
Type can be owner's network and guest network, and more complicated password can be set in owner's network, only use for kinsfolk;It visits
Objective network can be the wireless network used exclusively for the guest for middle visit of getting home or friend, can limit network speed, setting is exempted from
It is close etc., increase influence to network speed to reduce visitor, the master network password of oneself is avoided to reveal, it is right according to the difference of network type
The judgement of authentication information is not also identical, and specific judgment mode may include following two situation.
As an implementation, as shown in figure 5, obtaining the network type of the mobile terminal connection, root in step S60
Judge whether the authentication information of the mobile terminal is effective according to the network type, including:
Step S601. judges whether to store institute when the network type for obtaining the mobile terminal connection is owner's network
The re-authentication information for stating mobile terminal thens follow the steps S602, determines recognizing for the mobile terminal when determining result is to be
It is effective to demonstrate,prove information, when it is no for determining result, thens follow the steps S603, determines that the authentication information of the mobile terminal is invalid.
In step s 601, in owner's network set by wireless router, wireless router is periodically to being stored
Information is deleted, for example, re-authentication is needed when the replacement password of half a year or 1 year, when the mobile terminal of visitor is not for the first time
It when connection, needs to detect whether authentication storage information at this time, if the authentication information of visitor is deleted, needs to re-start and recognize
Card.
As an implementation, as shown in fig. 6, obtaining the network type of the mobile terminal connection, root in step S60
Judge whether the authentication information of the mobile terminal is effective according to the network type, including:
Step S604. judges described mobile whole when the network type for obtaining the mobile terminal connection is guest network
Whether the re-authentication time at end is more than preset time period, when determining to be more than preset time period, thens follow the steps S603, is determined
The authentication information of the mobile terminal is invalid, when determining to be less than preset time period, thens follow the steps S605, judges whether to deposit
The re-authentication information for storing up the mobile terminal thens follow the steps S602, determines the mobile terminal when determining result is to be
Authentication information it is effective, when it is no for determining result, then follow the steps S603, determine the authentication information of the mobile terminal without
Effect.
In step s 604, authenticated time is arranged to visitor in wireless router, which can be 1 day or 1 week,
When the network type that the mobile terminal of visitor connects is guest network, judge visitor's mobile terminal not and be when connecting for the first time, this
When judge whether the authenticated time of visitor is more than preset time, if it exceeds preset time, needs to re-start re-authentication.
In present embodiment, authentication information is judged according to network type, when network type is visitor's type, is sentenced
Certification is re-started when determining authenticated time more than preset time, improves the peace in mobile terminal and wireless router connection procedure
Quan Xing.
The embodiment of the present invention 1 is specifically described below by specific case:
For example, visitor A acts as a guest to user B family, the mobile terminal of visitor A and the wireless router of user B family are attached
When, as shown in fig. 7, total identifying procedure is that mobile terminal accesses wireless router, wireless router judges whether to need password
Certification needs cipher authentication then prompting mobile terminal input password, and after mobile terminal inputs password, wireless router judges that this is close
Whether code is by certification, and when passing through certification or when not needing cipher authentication, it is determined whether to enable re-authentications, if opened
Re-authentication determines that certification passes through then when judging that re-authentication passes through or when being not turned on re-authentication;Wherein, judge
The process that re-authentication passes through includes access process and non-access process for the first time for the first time, as shown in figure 8, access process is such as the first time
Under:Judge whether mobile terminal is to access for the first time, otherwise enter non-access process for the first time, be, recognizes to mobile terminal push is secondary
Card guidance interface, when the mobile terminal of user A is close to wireless router, whether wireless router detection RSSI value meets access
Condition determines that certification passes through, and mobile terminal is added in white list, and mobile terminal is accessed net when meeting access conditions
Network determines that certification does not pass through when detection does not meet access conditions, cannot will singly be added in white list in movement, at this point, not
It can be by connection of mobile terminal into network;As shown in figure 9, non-access process for the first time is as follows:Judge mobile terminal access network whether
For guest network, authenticated time is judged when being guest network whether more than 24 hours, is then prompting mobile terminal re-authentication, it is no
Then judge whether authentication information is effective, when accessing network is not guest network, otherwise judges whether authentication information is effective, when recognizing
When card information is effective, authenticates and be successfully attached with mobile terminal, the re-authentication when authentication information is invalid, when re-authentication is logical
It is out-of-date, it authenticates and is successfully attached with mobile terminal.
The present invention provides a kind of wireless router and its connection authentication method, and connection authentication method includes:It receives mobile whole
Hold send connection request, judge whether to need cipher authentication, when determine do not pass through cipher authentication when, then refusal and mobile terminal
Connection;When determining to pass through cipher authentication, then judge whether mobile terminal is to connect for the first time, when determining is to connect for the first time, then
Re-authentication prompt is sent to mobile terminal, judges whether mobile terminal passes through re-authentication, when determining to pass through re-authentication,
It is then connect with mobile terminal, when determining not pass through re-authentication, then refusal is connect with mobile terminal, when judgement is not to connect for the first time
When connecing, then the network type for obtaining mobile terminal connection is held, judges whether the authentication information of mobile terminal has according to network type
Effect returns when determining invalid and executes re-authentication, when determining effective, then connect with mobile terminal, technical solution of the present invention
When wireless router is connect with mobile terminal, by repeatedly being authenticated, it is possible to prevente effectively from because of WiFi password cracking software pair
The password of wireless router carries out cracking caused security risk.
Embodiment 2
The embodiment of the present invention 2 provides a kind of wireless router, and as shown in Figure 10, the wireless router includes connection request
It is receiving module 101, cipher authentication detection module 102, cipher authentication judgment module 103, first connection judgment module 104, secondary
Authentication determination module 105 and authentication information judgment module 106;
The connection request receiving module 101 is used to receive the connection request of mobile terminal transmission;
The cipher authentication detection module 102 when needing cipher authentication, then drives for judging whether to need cipher authentication
It moves the cipher authentication judgment module 103 to work, when not needing cipher authentication, then drives the first connection judgment module
104 work;
The cipher authentication judgment module 103 is used to send cipher authentication prompt to the mobile terminal, receives the shifting
The password of dynamic terminal transmission simultaneously judges whether the password passes through cipher authentication, when determining to pass through cipher authentication, then drives institute
The work of first connection judgment module 104 is stated, when determining not pass through cipher authentication, then refusal is connect with the mobile terminal;
The first connection judgment module 104 is for judging whether the mobile terminal is to connect for the first time, when judgement is first
When secondary connection, then the re-authentication judgment module 105 is driven to work, when determining is not to connect for the first time, then recognized described in driving
Signal judgement module 106 is demonstrate,proved to work;
The re-authentication judgment module 105 is used to send re-authentication prompt to the mobile terminal, judges the shifting
Whether dynamic terminal passes through re-authentication, when determining to pass through re-authentication, then connect with the mobile terminal, when judgement does not pass through
When re-authentication, then refusal is connect with the mobile terminal;
The authentication information judgment module 106 is used to obtain the network type of the mobile terminal connection, according to the net
Network type judges whether the authentication information of the mobile terminal is effective, when determining invalid, then the re-authentication is driven to judge
Module 105 is reworked, and when determining effective, is then connect with the mobile terminal.
Further, the first connection judgment module 104 judges whether the mobile terminal is the process connected for the first time,
Specially:
Judge in stored white list whether to include mobile terminal, when determining result is to be, then determines to be to connect for the first time
It connects, when it is no for determining result, then determines it is not to connect for the first time.
Further, the re-authentication judgment module 105 sends re-authentication prompt to the mobile terminal, judges institute
State mobile terminal whether by the process of re-authentication, specially:
Whether the prompt that the close wireless router is sent to the mobile terminal judges the mobile terminal default
In distance, when determining result is to be, then determine that the mobile terminal by re-authentication, the mobile terminal is added to white
In list, when it is no for determining result, then determine that the mobile terminal does not pass through re-authentication.
Further, the re-authentication judgment module 105 judge the mobile terminal whether the mistake in pre-determined distance
Journey, specially:
Whether the change rate of detection received signal strength is greater than preset value, when determining result is to be, then determines the shifting
Dynamic terminal when it is no for determining result, then determines the mobile terminal not in pre-determined distance in pre-determined distance.
As an implementation, the authentication information judgment module 106 obtains the network class of the mobile terminal connection
Type judges whether the authentication information of the mobile terminal is effective according to the network type, including:
When the network type for obtaining the mobile terminal connection is owner's network, judge whether to store the mobile terminal
Re-authentication information, when determine result be when, then determine that the authentication information of the mobile terminal is effective, when determine result be
When no, then determine that the authentication information of the mobile terminal is invalid.
As another embodiment, the authentication information judgment module 106 obtains the network of the mobile terminal connection
Type judges whether the authentication information of the mobile terminal is effective according to the network type, including:
When the network type for obtaining the mobile terminal connection is guest network, judge that the secondary of the mobile terminal is recognized
It demonstrate,proves whether the time is more than preset time period, when determining to be more than preset time period, then determines the authentication information of the mobile terminal
In vain, when determining to be less than preset time period, judge whether the re-authentication information for storing the mobile terminal, when judgement is tied
Fruit is when being, then to determine that the authentication information of the mobile terminal is effective, when it is no for determining result, then determines the mobile terminal
Authentication information it is invalid.
The specific work process of above-mentioned control method, can be with reference to the corresponding process of module each in previous embodiment 1, herein
It repeats no more.
The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to the foregoing embodiments
Invention is explained in detail, those skilled in the art should understand that:It still can be to aforementioned each implementation
Technical solution documented by example is modified or equivalent replacement of some of the technical features;And these modification or
Replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all include
Within protection scope of the present invention.
Claims (10)
1. a kind of connection authentication method of wireless router, which is characterized in that the connection authentication method includes:
Step A. receives the connection request that mobile terminal is sent, and judges whether to need cipher authentication, when needing cipher authentication, then
It executes step B and thens follow the steps C when not needing cipher authentication;
Step B. sends cipher authentication prompt to the mobile terminal, receives described in the password that the mobile terminal is sent and judgement
Whether password passes through cipher authentication, when determining to pass through cipher authentication, thens follow the steps C, when determining not pass through cipher authentication,
Then refusal is connect with the mobile terminal;
Step C. judges whether the mobile terminal is to connect for the first time, when determining is to connect for the first time, D is thened follow the steps, when sentencing
Fixed is not when connecting for the first time, to then follow the steps E;
Step D. sends re-authentication prompt to the mobile terminal, judges whether the mobile terminal passes through re-authentication, when
When judgement passes through re-authentication, then it is connect with the mobile terminal, when determining not pass through re-authentication, then refusal and the shifting
Dynamic terminal connection;
Step E. obtains the network type of the mobile terminal connection, judges recognizing for the mobile terminal according to the network type
It whether effective demonstrate,proves information, when determining invalid, returns and execute the step D, when determining effective, then connect with the mobile terminal
It connects.
2. connection authentication method as described in claim 1, which is characterized in that judge whether the mobile terminal is to connect for the first time
It connects, including:
Judge in stored white list whether to include mobile terminal, when determining result is to be, then determines to be to connect for the first time, when
When determining that result is no, then determine it is not to connect for the first time.
3. connection authentication method as described in claim 1, which is characterized in that send re-authentication to the mobile terminal and mention
Show, judges whether the mobile terminal passes through re-authentication, including:
Whether the prompt that the close wireless router is sent to the mobile terminal, judge the mobile terminal in pre-determined distance
It is interior, when determining result is to be, then determine that the mobile terminal by re-authentication, is added to white list by the mobile terminal
In, when it is no for determining result, then determine that the mobile terminal does not pass through re-authentication.
4. connection authentication method as claimed in claim 3, which is characterized in that judge the mobile terminal whether in pre-determined distance
It is interior, including:
Whether the change rate of detection received signal strength is greater than preset value, when determining result is to be, then determines described mobile whole
End when it is no for determining result, then determines the mobile terminal not in pre-determined distance in pre-determined distance.
5. connection authentication method as described in claim 1, which is characterized in that obtain the network class of the mobile terminal connection
Type judges whether the authentication information of the mobile terminal is effective according to the network type, including:
When the network type for obtaining the mobile terminal connection is owner's network, judge whether to store the two of the mobile terminal
Secondary authentication information then determines that the authentication information of the mobile terminal is effective when determining result is to be, when judgement result is no
When, then determine that the authentication information of the mobile terminal is invalid.
6. connection authentication method as described in claim 1, which is characterized in that obtain the network class of the mobile terminal connection
Type judges whether the authentication information of the mobile terminal is effective according to the network type, including:
When the network type for obtaining the mobile terminal connection is guest network, when judging the re-authentication of the mobile terminal
Between whether be more than preset time period, when determine be more than preset time period when, then determine that the authentication information of the mobile terminal is invalid,
When determining to be less than preset time period, judge whether the re-authentication information for storing the mobile terminal, when judgement result is
When being, then determine that the authentication information of the mobile terminal is effective, when it is no for determining result, then determines recognizing for the mobile terminal
It is invalid to demonstrate,prove information.
7. a kind of wireless router, which is characterized in that the wireless router includes connection request receiving module, cipher authentication inspection
It surveys module, cipher authentication judgment module, first connection judgment module, re-authentication judgment module and authentication information and judges mould
Block;
The connection request receiving module is used to receive the connection request of mobile terminal transmission;
The cipher authentication detection module is for judging whether to need cipher authentication, when needing cipher authentication, then described in driving
The work of cipher authentication judgment module then drives the first connection judgment module to work when not needing cipher authentication;
The cipher authentication judgment module is used to send cipher authentication prompt to the mobile terminal, receives the mobile terminal hair
The password that send simultaneously judges whether the password passes through cipher authentication, and when determining to pass through cipher authentication, then driving is described connects for the first time
Judgment module work is connect, when determining not pass through cipher authentication, then refusal is connect with the mobile terminal;
The first connection judgment module is for judging whether the mobile terminal is to connect for the first time, when judgement is to connect for the first time
When, then it drives the re-authentication judgment module to work, when determining is not to connect for the first time, then the authentication information is driven to judge
Module work;
The re-authentication judgment module is used to send re-authentication prompt to the mobile terminal, judges that the mobile terminal is
It is no then to be connect with the mobile terminal by re-authentication when determining to pass through re-authentication, when judgement does not pass through re-authentication
When, then refusal is connect with the mobile terminal;
The authentication information judgment module is used to obtain the network type of the mobile terminal connection, is sentenced according to the network type
Break the mobile terminal authentication information it is whether effective, when determine it is invalid when, then drive the re-authentication judgment module again
Work is then connect with the mobile terminal when determining effective.
8. wireless router as claimed in claim 7, which is characterized in that the first connection judgment module judges the movement
Whether terminal is the process connected for the first time, specially:
Judge in stored white list whether to include mobile terminal, when determining result is to be, then determines to be to connect for the first time, when
When determining that result is no, then determine it is not to connect for the first time.
9. wireless router as claimed in claim 7, which is characterized in that the re-authentication judgment module is whole to the movement
End sends re-authentication prompt, judge the mobile terminal whether by the process of re-authentication, specially:
Whether the prompt that the close wireless router is sent to the mobile terminal, judge the mobile terminal in pre-determined distance
It is interior, when determining result is to be, then determine that the mobile terminal by re-authentication, is added to white list by the mobile terminal
In, when it is no for determining result, then determine that the mobile terminal does not pass through re-authentication.
10. wireless router as claimed in claim 9, which is characterized in that the re-authentication judgment module judges the shifting
Dynamic terminal whether the process in pre-determined distance, specially:
Whether the change rate of detection received signal strength is greater than preset value, when determining result is to be, then determines described mobile whole
End when it is no for determining result, then determines the mobile terminal not in pre-determined distance in pre-determined distance.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810418961.2A CN108834142B (en) | 2018-05-04 | 2018-05-04 | Wireless router and connection authentication method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810418961.2A CN108834142B (en) | 2018-05-04 | 2018-05-04 | Wireless router and connection authentication method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108834142A true CN108834142A (en) | 2018-11-16 |
CN108834142B CN108834142B (en) | 2021-06-08 |
Family
ID=64147402
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810418961.2A Active CN108834142B (en) | 2018-05-04 | 2018-05-04 | Wireless router and connection authentication method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108834142B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112887982A (en) * | 2021-01-25 | 2021-06-01 | 绍兴文理学院元培学院 | Intelligent authority management method, system, terminal and storage medium based on network |
CN116113012A (en) * | 2023-04-14 | 2023-05-12 | 微网优联科技(成都)有限公司 | Access control method, device and system of wireless router and storage medium |
WO2024103206A1 (en) * | 2022-11-14 | 2024-05-23 | Huawei Technologies Co., Ltd. | Authentication method, terminal, and network device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104093147A (en) * | 2014-06-30 | 2014-10-08 | 广东九联科技股份有限公司 | Automatic connection and authorization method for close-range WIFI |
CN104540131A (en) * | 2015-01-13 | 2015-04-22 | 贺湘平 | Authentication method based on wireless signal intensity |
CN104954979A (en) * | 2014-03-27 | 2015-09-30 | 张兆龙 | Wireless network authentication and authorization method and apparatus |
US20160029215A1 (en) * | 2014-07-23 | 2016-01-28 | Samsung Electronics Co., Ltd. | Electronic device and method for discovering network in electronic device |
CN105516977A (en) * | 2015-12-03 | 2016-04-20 | 广东石油化工学院 | Password-free WiFi (Wireless Fidelity) authentication method based on dual-channel wireless router or AP (Access Point) |
CN106488525A (en) * | 2016-12-13 | 2017-03-08 | 国家电网公司信息通信分公司 | A kind of wireless network construction method of IP dynamic binding and corresponding network framework |
CN107295606A (en) * | 2017-06-30 | 2017-10-24 | 北京小米移动软件有限公司 | Method for connecting network, device and user equipment |
-
2018
- 2018-05-04 CN CN201810418961.2A patent/CN108834142B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104954979A (en) * | 2014-03-27 | 2015-09-30 | 张兆龙 | Wireless network authentication and authorization method and apparatus |
CN104093147A (en) * | 2014-06-30 | 2014-10-08 | 广东九联科技股份有限公司 | Automatic connection and authorization method for close-range WIFI |
US20160029215A1 (en) * | 2014-07-23 | 2016-01-28 | Samsung Electronics Co., Ltd. | Electronic device and method for discovering network in electronic device |
CN104540131A (en) * | 2015-01-13 | 2015-04-22 | 贺湘平 | Authentication method based on wireless signal intensity |
CN105516977A (en) * | 2015-12-03 | 2016-04-20 | 广东石油化工学院 | Password-free WiFi (Wireless Fidelity) authentication method based on dual-channel wireless router or AP (Access Point) |
CN106488525A (en) * | 2016-12-13 | 2017-03-08 | 国家电网公司信息通信分公司 | A kind of wireless network construction method of IP dynamic binding and corresponding network framework |
CN107295606A (en) * | 2017-06-30 | 2017-10-24 | 北京小米移动软件有限公司 | Method for connecting network, device and user equipment |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112887982A (en) * | 2021-01-25 | 2021-06-01 | 绍兴文理学院元培学院 | Intelligent authority management method, system, terminal and storage medium based on network |
CN112887982B (en) * | 2021-01-25 | 2022-01-25 | 绍兴文理学院元培学院 | Intelligent authority management method, system, terminal and storage medium based on network |
WO2024103206A1 (en) * | 2022-11-14 | 2024-05-23 | Huawei Technologies Co., Ltd. | Authentication method, terminal, and network device |
CN116113012A (en) * | 2023-04-14 | 2023-05-12 | 微网优联科技(成都)有限公司 | Access control method, device and system of wireless router and storage medium |
CN116113012B (en) * | 2023-04-14 | 2023-07-21 | 微网优联科技(成都)有限公司 | Access control method, device and system of wireless router and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108834142B (en) | 2021-06-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11968525B2 (en) | Vehicle digital key sharing service method and system | |
CN104506561B (en) | Terminal profile access control method and device | |
EP2888855B1 (en) | Systems and methods for lock access management using wireless signals | |
US9262460B2 (en) | Method for entering identification data of a vehicle into a user database of an internet server device | |
CN103229184B (en) | For the method and system of the access to secure resources | |
US20180115546A1 (en) | Information processing device, information processing system, and information processing method | |
CN105282868B (en) | System and method for WiFi network to be temporarily added | |
CN104255064B (en) | Sending access information from an entity access control system to a user terminal | |
CN104157029A (en) | Access control system, mobile terminal based control method thereof and mobile terminal | |
CN103607712A (en) | Access method and device for wireless network | |
CN104537291A (en) | Screen interface unlocking method and screen interface unlocking device | |
US9471048B2 (en) | Systems and methods for lock access control management using social networks | |
CN105119776B (en) | A kind of WiFi connection failures reason detection method and system | |
CN103415016A (en) | Mobile WIFI hotspot connection processing method and system | |
CN103813334A (en) | Right control method and right control device | |
CN105893802A (en) | Method for locking/unlocking computer screen based on Bluetooth | |
CN103781074A (en) | Security access method and equipment of wireless local area network | |
CN108834142A (en) | Wireless router and its connection authentication method | |
CN206522020U (en) | A kind of intelligent door lock and system | |
JP2019036091A (en) | Vehicle security system and vehicle security method | |
CN105516977B (en) | Exempt from password WiFi authentication method based on two-channel wireless router or AP | |
US20210243188A1 (en) | Methods and apparatus for authenticating devices | |
CN105516974A (en) | Router connection method, terminal and router | |
KR101368755B1 (en) | System and method for managing port and shipping container using smart phone | |
US20210029543A1 (en) | Method and device for authenticating device using wireless lan service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 518000 R & D building 3501, block a, building 7, Vanke Cloud City Phase I, Xingke 1st Street, Xili community, Xili street, Nanshan, Shenzhen, Guangdong Applicant after: Tubatu Group Co.,Ltd. Address before: 1001-a, 10th floor, bike technology building, No.9, Keke Road, high tech Zone, Nanshan District, Shenzhen, Guangdong 518000 Applicant before: SHENZHEN BINCENT TECHNOLOGY Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |