CN114143102B - Router secret-free login method, secret-free login device and computer device - Google Patents

Router secret-free login method, secret-free login device and computer device Download PDF

Info

Publication number
CN114143102B
CN114143102B CN202111478040.3A CN202111478040A CN114143102B CN 114143102 B CN114143102 B CN 114143102B CN 202111478040 A CN202111478040 A CN 202111478040A CN 114143102 B CN114143102 B CN 114143102B
Authority
CN
China
Prior art keywords
target
login
router
plugging
free
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111478040.3A
Other languages
Chinese (zh)
Other versions
CN114143102A (en
Inventor
苏邓海
董浩
张远茂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Gongjin Electronics Co Ltd
Original Assignee
Shenzhen Gongjin Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Gongjin Electronics Co Ltd filed Critical Shenzhen Gongjin Electronics Co Ltd
Priority to CN202111478040.3A priority Critical patent/CN114143102B/en
Publication of CN114143102A publication Critical patent/CN114143102A/en
Application granted granted Critical
Publication of CN114143102B publication Critical patent/CN114143102B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/60Router architectures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Small-Scale Networks (AREA)

Abstract

The application provides a router secret-free login method, secret-free login equipment and computer equipment. The method comprises the following steps: if the monitoring unit monitors the network cable plugging action of any LAN interface acting on the target router, judging whether the LAN interface acted by the network cable plugging action is a first target interface; if the monitoring unit judges that the LAN interface is a first target interface and the plugging time and the plugging times corresponding to the network cable plugging action meet the first preset conditions, the monitoring unit sends a first password-free login request to the login unit; the login unit executes a secret access-free operation based on the first secret login-free request, so that target terminal equipment which establishes wired connection with the target router in a preset period of time is prevented from being closely accessed to a target network corresponding to the target router. According to the password authentication method and device, the plug-in action is used as the authentication condition of login qualification, so that password authentication operation is saved, and password-free login can be realized.

Description

Router secret-free login method, secret-free login device and computer device
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a router secret-free login method, a secret-free login device, and a computer device.
Background
The routers basically keep management pages for common users to configure, and some routers also keep management modes of telnet and the like entering the routers. But requires entry of a management password, whether it be a management page or telnet login. Also, with security in mind, the initial management password for each router is random, which can typically be found on the label of the router product. After the user logs into the router, the management password may be reset.
However, in daily life, because the router is not configured for a long time, the phenomenon that the user forgets to manage the password by the router often occurs, or the router is used for a long time, the label of the shell is fuzzy or does not exist, or the random initial management password of the router is manually input in a troublesome mode, and the like.
Therefore, the prior art has the technical problem that the user cannot avoid the secret login of the router on the premise of ensuring the security.
Disclosure of Invention
In order to solve the technical problems, the invention provides a router secret-free login method, a router secret-free login device and computer equipment, and the specific scheme is as follows:
in a first aspect, an embodiment of the present application provides a method for secure-free login of a router, which is applied to a secure-free login device of a router, where the secure-free login device of a router includes a monitoring unit and a login unit, both the monitoring unit and the login unit are connected with a target router, and the method for secure-free login of a router includes:
the monitoring unit monitors the network cable plugging action of any LAN interface acting on the target router;
if the monitoring unit monitors the network cable plugging and unplugging action of any LAN interface acting on the target router, judging whether the LAN interface acted by the network cable plugging and unplugging action is a first target interface or not;
if the monitoring unit judges that the LAN interface is the first target interface and the plugging time and the plugging times corresponding to the network cable plugging action meet the first preset condition, the monitoring unit sends a first password-free login request to the login unit;
and the login unit executes a secret access-free operation based on the first secret login-free request, so that target terminal equipment which establishes wired connection with the target router in a preset period of time is prevented from being secret accessed to a target network corresponding to the target router.
According to a specific embodiment disclosed in the present application, the step of the monitoring unit determining that the plugging time and the plugging times corresponding to the network cable plugging action meet the first preset conditions includes:
judging whether the plugging time corresponding to the network cable plugging action meets a first sub-condition, wherein the first sub-condition is that the network cable corresponds to within a first preset timeThe continuous access time length of the interface and the first target interface is greater than or equal to T 1 And the continuous disconnection time after the first target interface is continuously accessed is greater than or equal to T 2 ,T 1 And T 2 Are all arbitrary numbers;
if the plugging time corresponding to the network cable plugging action meets a first sub-condition, judging whether the plugging frequency corresponding to the network cable plugging action meets a second sub-condition, wherein the second sub-condition is that the plugging frequency corresponding to the network cable plugging action is greater than or equal to N within a second preset time 1 And the plugging action meets the first sub-condition at any time.
According to a specific embodiment disclosed in the present application, the target network is a first network, and the login unit performs a step of performing a no-access operation based on the first no-access request, including:
if the login unit receives the first password-free login request, the login unit enters a preconfigured first password-free login state;
the login unit determines a first reference device which establishes wired connection with the target router as a target device in a third preset time corresponding to the first password-free login state;
the login unit sends a first admission instruction to the target device, wherein the admission instruction is used for indicating the target device to access the first network corresponding to the target router.
According to one embodiment disclosed herein, the method further comprises:
the monitoring unit monitors the network cable plugging action of any LAN interface acting on the target router;
if the monitoring unit monitors the network cable plugging and unplugging action of any LAN interface acting on the target router, judging whether the LAN interface acted by the network cable plugging and unplugging action is a second target interface or not;
if the monitoring unit judges that the LAN interface is the second target interface and the plugging time and the plugging times corresponding to the network cable plugging action meet the second preset conditions, the monitoring unit sends a second password-free login request to the login unit;
and the login unit executes wireless protection setting operation based on the second password-free login request so that target terminal equipment which is in the wireless signal coverage range of the target router in the reference period accesses to a target network corresponding to the target router.
According to a specific embodiment disclosed in the present application, the step of the monitoring unit determining that the plugging time and the plugging times corresponding to the network cable plugging action both satisfy the second preset condition includes:
judging whether the plugging time corresponding to the network cable plugging action meets a third sub-condition, wherein the third sub-condition is that the duration time of the continuous access of the interface corresponding to the network cable and the second target interface is greater than or equal to T in a fourth preset time 3 Second, and the continuous disconnection time after continuous access to the second target interface is greater than or equal to T 4 Second, T 3 And T 4 Are all arbitrary numbers;
if the plugging time corresponding to the network cable plugging action meets a third sub-condition, judging whether the plugging frequency corresponding to the network cable plugging action meets a fourth sub-condition, wherein the fourth sub-condition is that the plugging frequency corresponding to the network cable plugging action is greater than or equal to N within a fifth preset time 2 And the plugging action meets the third sub-condition at any time.
According to a specific embodiment disclosed in the present application, the target network is a second network, and the login unit performs a wireless protection setting operation based on the second password-free login request, including:
if the login unit receives the second password-free login request, the login unit enters a second password-free login state which is configured in advance;
the login unit determines a second reference device in the wireless signal coverage range of the target router as a target device in a sixth preset time corresponding to the second password-free login state;
and the login unit sends a second access instruction to the target equipment, wherein the access instruction is used for indicating the target equipment to access the second network corresponding to the target router.
In a second aspect, an embodiment of the present application provides a router secret-free login device, which is applied to the router secret-free login method in any one of the first aspects, where the router secret-free login device includes a monitoring unit and a login unit, where the monitoring unit and the login unit are both connected with a target router;
the monitoring unit is used for monitoring the network cable plugging action of any LAN interface acting on the target router, and judging whether the LAN interface acting on the network cable plugging action is a first target interface or not if the monitoring unit monitors the network cable plugging action of any LAN interface acting on the target router;
if the monitoring unit judges that the LAN interface is the first target interface and the plugging time and the plugging times corresponding to the network cable plugging action meet the first preset condition, the monitoring unit sends a first password-free login request to the login unit;
the login unit is used for executing a secret access-free operation based on the first secret login-free request, so that target terminal equipment which establishes wired connection with the target router in a preset period of time is free from secret access to a target network corresponding to the target router.
According to a specific implementation manner disclosed in the application, the monitoring unit is used for monitoring network cable plugging actions of any LAN interface acting on the target router;
if the monitoring unit monitors the network cable plugging and unplugging action of any LAN interface acting on the target router, judging whether the LAN interface acted by the network cable plugging and unplugging action is a second target interface or not;
if the monitoring unit judges that the LAN interface is the second target interface and the plugging time and the plugging times corresponding to the network cable plugging action meet the second preset conditions, the monitoring unit sends a second password-free login request to the login unit;
the login unit is used for executing wireless protection setting operation based on the second password-free login request, so that target terminal equipment which is in the wireless signal coverage range of the target router in the reference period accesses to a target network corresponding to the target router.
In a third aspect, embodiments of the present application provide a computer device, where the computer device includes a processor and a memory, where the memory stores a computer program that, when executed on the processor, implements the router secret-free login method according to any one of the embodiments of the first aspect.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium storing a computer program, where the computer program when executed on a processor implements the router secret-free login method according to any one of the embodiments of the first aspect.
Compared with the prior art, the application has the following beneficial effects:
if the monitoring unit monitors the network cable plugging action of any LAN interface acting on the target router, the monitoring unit judges whether the LAN interface acted by the network cable plugging action is a first target interface. If the monitoring unit judges that the LAN interface is a first target interface and the plugging time and the plugging times corresponding to the network cable plugging action meet the first preset conditions, the monitoring unit sends a first password-free login request to the login unit so that target terminal equipment which establishes wired connection with the target router in a preset period is prevented from being closely connected with a target network corresponding to the target router. According to the method and the device, the plugging action is used as the verification condition of login qualification, password verification operation is saved, secret login-free can be achieved, and target terminal equipment which is in wired connection with the target router in a preset period is free from being closely connected with a target network corresponding to the target router, so that user experience is improved.
Drawings
In order to more clearly illustrate the technical solutions of the present invention, the drawings that are required for the embodiments will be briefly described, it being understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope of the present invention. Like elements are numbered alike in the various figures.
Fig. 1 is a schematic flow chart of a router password-free login method according to an embodiment of the present application;
fig. 2 is a schematic connection diagram of a router password-free login device applied in the router password-free login method provided in the embodiment of the present application;
fig. 3 is a second flowchart of a method for secure registration-free of a router according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments.
The components of the embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the invention, as presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be made by a person skilled in the art without making any inventive effort, are intended to be within the scope of the present invention.
The terms "comprises," "comprising," "including," or any other variation thereof, are intended to cover a specific feature, number, step, operation, element, component, or combination of the foregoing, which may be used in various embodiments of the present invention, and are not intended to first exclude the presence of or increase the likelihood of one or more other features, numbers, steps, operations, elements, components, or combinations of the foregoing.
Furthermore, the terms "first," "second," "third," and the like are used merely to distinguish between descriptions and should not be construed as indicating or implying relative importance.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which various embodiments of the invention belong. The terms (such as those defined in commonly used dictionaries) will be interpreted as having a meaning that is the same as the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein in connection with the various embodiments of the invention.
Some embodiments of the present application are described in detail below with reference to the accompanying drawings. The embodiments described below and features of the embodiments may be combined with each other without conflict.
Referring to fig. 1, fig. 1 is a schematic flow chart of a router password-free login method according to an embodiment of the present application. The router secret-free login method is applied to router secret-free login equipment, and the router secret-free login equipment comprises a monitoring unit and a login unit, wherein the monitoring unit and the login unit are both connected with a target router.
If a certain terminal device needs to be connected with a router through a wired Ethernet, whether the following conditions are met or not can be judged: in a short time, a network cable is continuously plugged into and pulled out from a certain LAN port of a target router at certain time intervals, so that terminal equipment can avoid dense login of the router through the LAN port in a preset time period. Wherein, one time of plugging and one time of pulling, or one time of plugging and one time of plugging are combined to calculate once.
As shown in fig. 1, the method mainly includes:
step S101, the monitoring unit monitors the network cable plugging action of any LAN interface acting on the target router.
Referring to fig. 2, fig. 2 is a connection schematic diagram of a router secret-free login device applied in the router secret-free login method provided in the embodiment of the present application. In specific implementation, the monitoring unit may monitor the network cable plug action of any LAN interface acting on the target router through an ethernet controller (Media Access Control, abbreviated as MAC) and a Physical Layer interface (PHY). The monitoring unit can be kept in a continuous on state, and can also be kept in an on state within a specific time range according to specific use requirements and application scenes of users, and the method is not particularly limited herein.
Step S102, if the monitoring unit monitors a network cable plug action acting on any LAN interface of the target router, it is determined whether the LAN interface acted by the network cable plug action is a first target interface.
The listening area of the listening unit may be all LAN ports of the target router. After the network cable plugging action of any LAN interface acting on the target router is monitored, judging whether the LAN interface acted by the network cable plugging action is a first target interface. In the implementation, the first target interface may be any LAN port within the monitoring range of the preset monitoring unit, or may be a certain LAN port, or may be a combination of multiple LAN ports in the target router or all LAN ports.
Step S103, if the monitoring unit determines that the LAN interface is the first target interface, and the plugging time and the plugging times corresponding to the network cable plugging action both satisfy a first preset condition, the monitoring unit sends a first password-free login request to the login unit.
Whether the plugging time corresponding to the network cable plugging action meets a first sub-condition can be judged, wherein the first sub-condition is that the duration time of continuous access of the interface corresponding to the network cable and the first target interface is longer than or equal to T in a first preset time 1 And the continuous disconnection time after the first target interface is continuously accessed is greater than or equal to T 2 ,T 1 And T 2 Are all arbitrary numbers. The first preset time may be a maximum value of a sum of a duration of the interface corresponding to the network cable and the first target interface, a duration of disconnection of the interface corresponding to the network cable after the interface corresponding to the network cable is continuously connected to the first target interface, and a fault tolerance time. For example T 1 May be 2 seconds, T 2 Or 2 seconds, and the fault tolerance time corresponding to each plugging or unplugging can be 1 second, then, the first preset timeThe interval may be 2+1+2+1=6 seconds. By setting a certain fault-tolerant time, a certain time delay or delay can be allowed on the premise of starting the password-free login function, and the experience of a user can be improved.
It should be noted that, the time and sequence of the plug between the interface corresponding to the network cable and the first target interface need to be strictly satisfied, so that the user experience is improved, the security of the user without secret setting is ensured, and the false triggering probability of the secret login is reduced.
If the plugging time corresponding to the network cable plugging action meets a first sub-condition, judging whether the plugging frequency corresponding to the network cable plugging action meets a second sub-condition, wherein the second sub-condition is that the plugging frequency corresponding to the network cable plugging action is greater than or equal to N within a second preset time 1 And the plugging action meets the first sub-condition at any time.
In specific implementation, the first sub-condition is plugged once, or plugged once and plugged once are combined to calculate one plug. The second preset time may be a fixed time length calculated from the first plugging action, and the number of plugging times corresponding to the network cable plugging action is greater than or equal to N only in the second preset time range 1 And then, the second sub-condition can be judged to be met. The first preset condition is divided into a first sub-condition and a second sub-condition, so that the safety of the whole secret-free login operation can be further ensured on the basis of the first sub-condition, and the probability that the secret-free login operation is triggered by mistake is reduced.
The first preset time and the second preset time may be the same or different, and the size relationship and specific data of the first preset time and the second preset time may be customized according to specific use requirements and application situations of users, which are not specifically limited herein.
Step S104, the login unit executes a secret-access-free operation based on the first secret-free login request, so that target terminal equipment which establishes wired connection with the target router in a preset period of time is free from secret access to a target network corresponding to the target router.
In implementation, the target network corresponding to the target router in such a state may be defined as the first network. And if the login unit receives the first password-free login request, the login unit enters a preconfigured first password-free login state. And the login unit determines a first reference device which establishes wired connection with the target router as a target device in a third preset time corresponding to the first password-free login state. The login unit sends a first admission instruction to the target device, wherein the admission instruction is used for indicating the target device to access the first network corresponding to the target router.
The first password-free login request may be for generating specific flag information, such as flag_1. If the login unit receives or recognizes the flag information flag_1, the user equipment may directly enter the management interface capable of using the first network without going through a module related to login processing. After entering the module related to the login process, the user equipment can directly enter the management interface capable of using the first network without inputting a login password.
The third preset time may be a duration for which the login unit maintains the target router in the first password-free login state. If any first reference device establishing wired connection with the target router can be detected within the third preset time, the first reference device can be determined to be the target device. The first reference device may be any terminal device that can establish a wired connection with the target router, such as a desktop computer or a notebook computer. The login unit sends a first admission instruction to the target device, and the first admission instruction is used for indicating the target device to access a first network corresponding to the target router.
The first sub-condition and the second sub-condition can improve the experience of the user and reduce the false triggering probability of the password-free login. The setting of the third preset time can ensure that the first reference device after a certain time is not accessed to the first network in a secret-free manner by limiting the continuous opening time of the first secret-free login state after the login unit enters the preconfigured first secret-free login state, so that the security of data or communication is further ensured.
The above embodiments are described further below with respect to a case where a personal pen, a desktop computer, or the like communicates with a target router through a wired connection, and a case where a target device establishes communication with the target router through a wireless connection. The specific implementation part may refer to the implementation process in steps S101 to S104, and similar parts will not be described in detail, and some nouns may be appropriately modified according to the foregoing description.
Referring to fig. 3, fig. 3 is a second flowchart of a method for secure registration-free of a router according to an embodiment of the present application. The method further comprises the steps of:
in step S301, the monitoring unit monitors a network cable plug action of any LAN interface acting on the target router.
Step S302, if the monitoring unit monitors a network cable plug action acting on any LAN interface of the target router, it is determined whether the LAN interface acted by the network cable plug action is a second target interface.
Step S303, if the monitoring unit determines that the LAN interface is the second target interface, and the plugging time and the plugging times corresponding to the network cable plugging action both satisfy a second preset condition, the monitoring unit sends a second password-free login request to the login unit.
The step that the monitoring unit judges that the plugging time and the plugging times corresponding to the network cable plugging action meet the second preset condition comprises the following steps:
judging whether the plugging time corresponding to the network cable plugging action meets a third sub-condition, wherein the third sub-condition is that the duration time of the continuous access of the interface corresponding to the network cable and the second target interface is greater than or equal to T in a fourth preset time 3 Second, and the continuous disconnection time after continuous access to the second target interface is greater than or equal to T 4 Second, T 3 And T 4 Are all arbitrary numbers;
if the plugging time corresponding to the network cable plugging action meets the third sub-condition, judging whether the plugging times corresponding to the network cable plugging action meet the fourth sub-condition or notThe fourth sub-condition is that the number of times of plugging corresponding to the network cable plugging action is greater than or equal to N within a fifth preset time 2 And the plugging action meets the third sub-condition at any time.
In step S304, the login unit performs a wireless protection setting operation based on the second password-free login request, so that the target terminal device in the wireless signal coverage range of the target router in the reference period accesses the target network corresponding to the target router.
The target network is a second network, and the login unit performs a wireless protection setting operation based on the second password-free login request, including:
if the login unit receives the second password-free login request, the login unit enters a second password-free login state which is configured in advance;
the login unit determines a second reference device in the wireless signal coverage range of the target router as a target device in a sixth preset time corresponding to the second password-free login state;
and the login unit sends a second access instruction to the target equipment, wherein the access instruction is used for indicating the target equipment to access the second network corresponding to the target router.
In the application, if the monitoring unit monitors the network cable plugging action of any LAN interface acting on the target router, it is determined whether the LAN interface acted by the network cable plugging action is the first target interface. If the monitoring unit judges that the LAN interface is a first target interface and the plugging time and the plugging times corresponding to the network cable plugging action meet the first preset conditions, the monitoring unit sends a first password-free login request to the login unit so that target terminal equipment which establishes wired connection with the target router in a preset period is prevented from being closely connected with a target network corresponding to the target router. According to the method and the device, the plugging action is used as the verification condition of login qualification, password verification operation is saved, secret login-free can be achieved, and target terminal equipment which is in wired connection with the target router in a preset period is free from being closely connected with a target network corresponding to the target router, so that user experience is improved.
Corresponding to the embodiment of the method, the invention also provides a router secret-free login device which is applied to the router secret-free login method and comprises a monitoring unit and a login unit, wherein the monitoring unit and the login unit are both connected with a target router;
the monitoring unit is used for monitoring the network cable plugging action of any LAN interface acting on the target router, and judging whether the LAN interface acting on the network cable plugging action is a first target interface or not if the monitoring unit monitors the network cable plugging action of any LAN interface acting on the target router;
if the monitoring unit judges that the LAN interface is the first target interface and the plugging time and the plugging times corresponding to the network cable plugging action meet the first preset condition, the monitoring unit sends a first password-free login request to the login unit;
the login unit is used for executing a secret access-free operation based on the first secret login-free request, so that target terminal equipment which establishes wired connection with the target router in a preset period of time is free from secret access to a target network corresponding to the target router.
In specific implementation, the monitoring unit is used for monitoring the network cable plugging action of any LAN interface acting on the target router;
if the monitoring unit monitors the network cable plugging and unplugging action of any LAN interface acting on the target router, judging whether the LAN interface acted by the network cable plugging and unplugging action is a second target interface or not;
if the monitoring unit judges that the LAN interface is the second target interface and the plugging time and the plugging times corresponding to the network cable plugging action meet the second preset conditions, the monitoring unit sends a second password-free login request to the login unit;
the login unit is used for executing wireless protection setting operation based on the second password-free login request, so that target terminal equipment which is in the wireless signal coverage range of the target router in the reference period accesses to a target network corresponding to the target router.
In addition, a computer device is provided, the computer device comprises a processor and a memory, the memory stores a computer program, and the computer program realizes the router password-free login method when being executed on the processor.
In addition, a computer readable storage medium is provided, the computer readable storage medium stores a computer program, and the computer program realizes the router password-free login method when being executed on a processor.
The specific implementation process of the fitting demand prediction model construction device, the computer device and the computer readable storage medium provided in the present application can refer to the specific implementation process of the router secret-free login method provided in the foregoing embodiment, and will not be described in detail herein.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus and method may be implemented in other manners as well. The apparatus embodiments described above are merely illustrative, for example, of the flow diagrams and block diagrams in the figures, which illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules or units in various embodiments of the invention may be integrated together to form a single part, or the modules may exist alone, or two or more modules may be integrated to form a single part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a smart phone, a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely illustrative of the present invention, and the present invention is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present invention.

Claims (9)

1. The router secret-free login method is characterized by being applied to router secret-free login equipment, wherein the router secret-free login equipment comprises a monitoring unit and a login unit, the monitoring unit and the login unit are both connected with a target router, and the method comprises the following steps:
the monitoring unit monitors the network cable plugging action of any LAN interface acting on the target router;
if the monitoring unit monitors the network cable plugging and unplugging action of any LAN interface acting on the target router, judging whether the LAN interface acted by the network cable plugging and unplugging action is a first target interface or not;
if the monitoring unit judges that the LAN interface is the first target interface and the plugging time and the plugging times corresponding to the network cable plugging action meet the first preset condition, the monitoring unit sends a first password-free login request to the login unit;
the login unit executes a secret-access-free operation based on the first secret-free login request, so that target terminal equipment which establishes wired connection with the target router in a preset period of time is free from secret access to a target network corresponding to the target router;
if the monitoring unit monitors the network cable plugging and unplugging action of any LAN interface acting on the target router, judging whether the LAN interface acted by the network cable plugging and unplugging action is a second target interface or not;
if the monitoring unit judges that the LAN interface is the second target interface and the plugging time and the plugging times corresponding to the network cable plugging action meet the second preset conditions, the monitoring unit sends a second password-free login request to the login unit;
and the login unit executes wireless protection setting operation based on the second password-free login request so that target terminal equipment which is in the wireless signal coverage range of the target router in the reference period accesses to a target network corresponding to the target router.
2. The method for password-free login of a router according to claim 1, wherein the step of the monitoring unit determining that the plugging time and the plugging times corresponding to the network cable plugging action satisfy both the first preset condition includes:
judging whether the plugging time corresponding to the network cable plugging action meets a first sub-condition, wherein the first sub-condition is that the continuous access time length of the interface corresponding to the network cable and the first target interface is greater than or equal to T within a first preset time 1 And the continuous disconnection time after the first target interface is continuously accessed is greater than or equal to T 2 ,T 1 And T 2 Are all arbitrary numbers;
if the plugging time corresponding to the network cable plugging action meets a first sub-condition, judging whether the plugging frequency corresponding to the network cable plugging action meets a second sub-condition, wherein the second sub-condition is that the plugging frequency corresponding to the network cable plugging action is greater than or equal to N within a second preset time 1 And the plugging action meets the first sub-condition at any time.
3. The router secret-free login method according to claim 1, wherein the target network is a first network, and the login unit performs a secret-free access operation based on the first secret-free login request, comprising:
if the login unit receives the first password-free login request, the login unit enters a preconfigured first password-free login state;
the login unit determines a first reference device which establishes wired connection with the target router as a target device in a third preset time corresponding to the first password-free login state;
the login unit sends a first admission instruction to the target device, wherein the admission instruction is used for indicating the target device to access the first network corresponding to the target router.
4. The method for password-free login of a router according to claim 1, wherein the step of the monitoring unit determining that the plugging time and the plugging times corresponding to the network cable plugging action satisfy both the second preset condition includes:
judging whether the plugging time corresponding to the network cable plugging action meets a third sub-condition, wherein the third sub-condition is that the duration time of the continuous access of the interface corresponding to the network cable and the second target interface is greater than or equal to T in a fourth preset time 3 Second, and the continuous disconnection time after continuous access to the second target interface is greater than or equal to T 4 Second, T 3 And T 4 Are all arbitrary numbers;
if the plugging time corresponding to the network cable plugging action meets a third sub-condition, judging whether the plugging frequency corresponding to the network cable plugging action meets a fourth sub-condition, wherein the fourth sub-condition is that the plugging frequency corresponding to the network cable plugging action is greater than or equal to N within a fifth preset time 2 And the plugging action meets the third sub-condition at any time.
5. The router secret-free login method according to claim 1, wherein the target network is a second network, and the login unit performs the wireless protection setting operation based on the second secret-free login request, comprising:
if the login unit receives the second password-free login request, the login unit enters a second password-free login state which is configured in advance;
the login unit determines a second reference device in the wireless signal coverage range of the target router as a target device in a sixth preset time corresponding to the second password-free login state;
and the login unit sends a second access instruction to the target equipment, wherein the access instruction is used for indicating the target equipment to access the second network corresponding to the target router.
6. A router secret-free login device, which is characterized by being applied to the router secret-free login method according to any one of claims 1 to 5, and comprises a monitoring unit and a login unit, wherein the monitoring unit and the login unit are both connected with a target router;
the monitoring unit is used for monitoring the network cable plugging action of any LAN interface acting on the target router, and judging whether the LAN interface acting on the network cable plugging action is a first target interface or not if the monitoring unit monitors the network cable plugging action of any LAN interface acting on the target router;
if the monitoring unit judges that the LAN interface is the first target interface and the plugging time and the plugging times corresponding to the network cable plugging action meet the first preset condition, the monitoring unit sends a first password-free login request to the login unit;
the login unit is used for executing a secret access-free operation based on the first secret login-free request, so that target terminal equipment which establishes wired connection with the target router in a preset period of time is free from secret access to a target network corresponding to the target router.
7. The router secret-free login device according to claim 6, wherein the monitoring unit is configured to monitor a network cable plug action acting on any LAN interface of the target router;
if the monitoring unit monitors the network cable plugging and unplugging action of any LAN interface acting on the target router, judging whether the LAN interface acted by the network cable plugging and unplugging action is a second target interface or not;
if the monitoring unit judges that the LAN interface is the second target interface and the plugging time and the plugging times corresponding to the network cable plugging action meet the second preset conditions, the monitoring unit sends a second password-free login request to the login unit;
the login unit is used for executing wireless protection setting operation based on the second password-free login request, so that target terminal equipment which is in the wireless signal coverage range of the target router in the reference period accesses to a target network corresponding to the target router.
8. A computer device, characterized in that it comprises a processor and a memory, the memory storing a computer program, which when executed on the processor implements the router secret login-free method according to any one of claims 1 to 5.
9. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program which, when executed on a processor, implements the router secret login method according to any one of claims 1 to 5.
CN202111478040.3A 2021-12-06 2021-12-06 Router secret-free login method, secret-free login device and computer device Active CN114143102B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111478040.3A CN114143102B (en) 2021-12-06 2021-12-06 Router secret-free login method, secret-free login device and computer device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111478040.3A CN114143102B (en) 2021-12-06 2021-12-06 Router secret-free login method, secret-free login device and computer device

Publications (2)

Publication Number Publication Date
CN114143102A CN114143102A (en) 2022-03-04
CN114143102B true CN114143102B (en) 2024-01-26

Family

ID=80384307

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111478040.3A Active CN114143102B (en) 2021-12-06 2021-12-06 Router secret-free login method, secret-free login device and computer device

Country Status (1)

Country Link
CN (1) CN114143102B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104092674A (en) * 2014-06-30 2014-10-08 广东九联科技股份有限公司 Router network security detection method and system based on set top box
EP3076632A2 (en) * 2015-03-30 2016-10-05 Xiaomi Inc. Method and apparatus for accessing a network
CN106100878A (en) * 2016-06-08 2016-11-09 深圳市梧桐世界科技股份有限公司 A kind of method realizing intel x86 router analog reset button
CN107070917A (en) * 2017-04-14 2017-08-18 天地融科技股份有限公司 A kind of network application login method and system
CN108683618A (en) * 2018-04-25 2018-10-19 广州视源电子科技股份有限公司 Communication equipment and intelligent terminal
CN109768994A (en) * 2019-03-05 2019-05-17 上海市共进通信技术有限公司 The method of quick registration certification control is realized in router
CN109787991A (en) * 2019-01-31 2019-05-21 平安科技(深圳)有限公司 Exempt from close login method, device, equipment and storage medium based on mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106535191A (en) * 2016-11-24 2017-03-22 北京小米移动软件有限公司 Network connection establishing method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104092674A (en) * 2014-06-30 2014-10-08 广东九联科技股份有限公司 Router network security detection method and system based on set top box
EP3076632A2 (en) * 2015-03-30 2016-10-05 Xiaomi Inc. Method and apparatus for accessing a network
CN106100878A (en) * 2016-06-08 2016-11-09 深圳市梧桐世界科技股份有限公司 A kind of method realizing intel x86 router analog reset button
CN107070917A (en) * 2017-04-14 2017-08-18 天地融科技股份有限公司 A kind of network application login method and system
CN108683618A (en) * 2018-04-25 2018-10-19 广州视源电子科技股份有限公司 Communication equipment and intelligent terminal
CN109787991A (en) * 2019-01-31 2019-05-21 平安科技(深圳)有限公司 Exempt from close login method, device, equipment and storage medium based on mobile terminal
CN109768994A (en) * 2019-03-05 2019-05-17 上海市共进通信技术有限公司 The method of quick registration certification control is realized in router

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Confrontation-Wi-Fi Risks and Data Breach;Ravi Teja Kamurthi等;2021 International Conference on Emerging Smart Computing and Informatics (ESCI);全文 *
轻松搞定!七大无线路由器常见问题解析;白宁;;网络与信息(第05期);全文 *

Also Published As

Publication number Publication date
CN114143102A (en) 2022-03-04

Similar Documents

Publication Publication Date Title
CN105681328B (en) The method, apparatus and electronic equipment of controlling electronic devices
CN101455041A (en) Detection of network environment
CN107888589A (en) A kind of method and its system for calling trusted application
CN108985095A (en) A kind of non-public file access method, system and electronic equipment and storage medium
SE525304C2 (en) Method and apparatus for controlling access between a computer and a communication network
CN114244568B (en) Security access control method, device and equipment based on terminal access behavior
US9444845B2 (en) Network security apparatus and method
EP3341888B1 (en) Methods and a system for secure data storage
CN112653668B (en) Data interaction method and device, computer equipment and storage medium
CN112464213B (en) Operating system access control method, device, equipment and storage medium
CN114143102B (en) Router secret-free login method, secret-free login device and computer device
CN113660268A (en) Login authorization management method, system, device and medium
CN115296926B (en) Network flow management and control method, device, equipment and medium
CN115883170A (en) Network flow data monitoring and analyzing method and device, electronic equipment and storage medium
TWI676115B (en) System and method for managing certification for cloud service system
CN111914311B (en) Hard disk password management method and device, electronic equipment and storage medium
CN112637849B (en) Terminal equipment access control method and device and multimedia broadcasting equipment
CN113365272B (en) Method and system for preventing network from being rubbed
CN104995635A (en) Image transmission method, device and terminal device
US9639137B2 (en) Control method and electronic device
CN109788435B (en) Wireless hotspot control method and device, electronic equipment and storage medium
CN111753340A (en) USB interface information security prevention and control method and system
CN111125678A (en) Method, device and medium for managing Option ROM loading
EP3163488B1 (en) Message sender authentication
WO2019223149A1 (en) Security authentication method, authentication server and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant