CN102791016A - Access processing method and device - Google Patents

Access processing method and device Download PDF

Info

Publication number
CN102791016A
CN102791016A CN2012102312140A CN201210231214A CN102791016A CN 102791016 A CN102791016 A CN 102791016A CN 2012102312140 A CN2012102312140 A CN 2012102312140A CN 201210231214 A CN201210231214 A CN 201210231214A CN 102791016 A CN102791016 A CN 102791016A
Authority
CN
China
Prior art keywords
access
terminal
module
identification information
cipher authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012102312140A
Other languages
Chinese (zh)
Other versions
CN102791016B (en
Inventor
门华江
詹昌漫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN XINFENG WEIYE TECHNOLOGY Co Ltd
Datang Mobile Communications Equipment Co Ltd
Original Assignee
SHENZHEN XINFENG WEIYE TECHNOLOGY Co Ltd
Datang Mobile Communications Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN XINFENG WEIYE TECHNOLOGY Co Ltd, Datang Mobile Communications Equipment Co Ltd filed Critical SHENZHEN XINFENG WEIYE TECHNOLOGY Co Ltd
Priority to CN201210231214.0A priority Critical patent/CN102791016B/en
Publication of CN102791016A publication Critical patent/CN102791016A/en
Application granted granted Critical
Publication of CN102791016B publication Critical patent/CN102791016B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an access processing method and an access processing device. The method comprises the following steps that after the first enabling signal receiving, the operation is switched to a first access mode; and in the first access mode, the preset number of terminals are subjected to password-free authentication access. Through the method and the device provided by the embodiment disclosed by the invention, when the access of a terminal user (a WIFI (wireless fidelity) network) is needed, the enabling signal can be triggered so that the password-free authentication access is carried out in the first access mode. Therefore, the specific terminal can be fast accessed into the network.

Description

A kind of access processing method and device
Technical field
The present invention relates to communication technical field, relate in particular to a kind of access processing method and device.
Background technology
Existing WIFI (wireless compatibility authentication) is provided the device of access function,, cipher authentication is carried out at the terminal that request inserts for safety of data transmission in the system.Accordingly, the terminal use need carry out operations such as corresponding password input.For some terminal use, carry out password input and insert the WIFI network and cause terminal use's experience relatively poor.So, the cipher authentication process becomes the obstacle that it uses the WIFI network for a part of terminal use.At present, the terminal of also not inserting for specific requests provides a kind of solution of quick access WIFI network.
Summary of the invention
The purpose of this invention is to provide a kind of access processing method, so that the particular terminal fast access into network.
The objective of the invention is to realize through following technical scheme:
A kind of access processing method comprises:
After receiving first enable signal, switch to first access module;
Under first access module, cipher authentication is exempted from the terminal of predetermined number insert.
A kind of access processing unit comprises:
The access module handover module, be used to receive first enable signal after, control inserts processing module and switches to first access module;
Insert processing module, be used under first access module, cipher authentication is exempted from the terminal of predetermined number insert.
The method and the device that provide through the embodiment of the invention when if the terminal use needs to insert (like the WIFI network), can trigger first enable signal, so that under first access module, exempt from cipher authentication and insert.Make that particular terminal can fast access into network.
Description of drawings
The method flow diagram that Fig. 1 provides for first embodiment of the invention;
The method flow diagram that Fig. 2 provides for second embodiment of the invention;
A kind of access module switch logic sketch map that Fig. 3 provides for the embodiment of the invention;
The method flow diagram that Fig. 4 third embodiment of the invention provides;
The method flow diagram that Fig. 5 provides for four embodiment of the invention;
The apparatus structure sketch map that Fig. 6 provides for the embodiment of the invention.
Embodiment
The embodiment of the invention provides a kind of access processing method, after receiving first enable signal, switches to first access module; Under first access module, cipher authentication is exempted from the terminal of predetermined number N insert.
Among each embodiment of the present invention, predetermined number N is meant, allows to exempt from the terminal number that cipher authentication inserts.
The method that provides through the embodiment of the invention when if the terminal use needs to insert (like the WIFI network), can trigger first enable signal, so that under first access module, exempts from cipher authentication and inserts.Make that particular terminal can fast access into network.
To combine accompanying drawing below, the method that the embodiment of the invention is provided is elaborated.
Among the embodiment, above-mentioned predetermined number N is less than the maximum that allows several M that access terminal.Then inserting processing unit, to carry out access processing method as shown in Figure 1, comprises following operation:
Step 100, receive first enable signal after, switch to first access module.
Step 110, under first access module, cipher authentication is exempted from the terminal of predetermined number N inserts, obtain and preserve and exempt from the identification information that cipher authentication accesses terminal.
In the various embodiments of the present invention, same terminal is repeatedly exempted from cipher authentication and is inserted under first access module, and its number scale does 1.For example, there is the terminal under first access module, to insert through exempting from the cipher authentication mode.Subsequently, access is withdrawed from this terminal.Still under current first access module, this terminal asks to insert once more.For this situation, when the cipher authentication access was repeatedly exempted from identical terminal, individual number scale did 1.
Step 120, reach predetermined number N, switch to second access module when exempting from the number that cipher authentication accesses terminal.
Step 130, under second access module, the identification information at the terminal that the request of obtaining inserts judges whether the identification information at terminal of this request access identical with the identification information of a preservation.
If execution in step 140, the terminal that this request is inserted are exempted from cipher authentication and are inserted.
Through above-mentioned processing procedure, when the terminal is successfully inserted through the mode of exempting from cipher authentication under first access module.So, for such particular terminal, under second access module, can exempt from cipher authentication to it through matching identification information and insert.Because identification information can unique identification terminal, therefore, the authentication access procedure of matching identification information is than the access procedure of cipher authentication, and fail safe is higher.In addition because exempting from of the allowing terminal number that cipher authentication inserts is less than the maximum number that accesses terminal, and specific terminal need not input password can access, therefore, the access procedure required time of matching identification information is less than cipher authentication and inserts required time.Through matching identification information cipher authentication access implementation being exempted from specific terminal also is a kind of quick access way.
In the above-mentioned processing procedure, under second access module, if the identification information of the identification information at the terminal that request inserts and preservation is all inequality, can be according to the access at current this terminal of number control that accesses terminal.The two kinds of implementations of giving an example below:
The maximum whether one of which, the terminal number of judging current access reach permission several M that access terminal, if, refuse the access request at the terminal that above-mentioned request inserts, otherwise, the cipher authentication access is carried out at the terminal that this request inserts.
Its two, can access network in order to guarantee to exempt from terminal that cipher authentication inserts, can be only when number is not more than P (P=M-N, M is the maximum that the allows number that accesses terminal, N is above-mentioned predetermined number), allows the terminal to carry out cipher authentication and insert at the terminal of current access.Whether the terminal number of judging current access reaches P, if, refuse the access request at the terminal of above-mentioned request access, otherwise, the cipher authentication access is carried out at the terminal that this request inserts.
For the current counting that accesses terminal, can realize through following mode: whenever there being a terminal to insert, counting adds 1, and whenever there being a terminal to withdraw from, counting subtracts 1.
Wherein, the current access module information of automatic preservation during the device shutdown, the access module before entering is shut down automatically after installing start once more.In addition, when the device shutdown, the identification information of having preserved is not deleted.
The implementation that the cipher authentication access is exempted from the terminal of control predetermined number has a variety of.It is wherein a kind of to give an example below: if allow to exempt from terminal number that cipher authentication inserts greater than 1, count exempting from the cipher authentication number that accesses terminal through counter.
When switching to first access module, the value of this counter is an initial value 0.
Every pair of terminal is exempted from cipher authentication and is inserted, and judges whether this terminal was carried out exempting from cipher authentication and inserted under current first access module, if then the value of counter is constant, otherwise the value of this counter adds 1.
If the value of counter reaches N, then switch to second access module.
Judge whether the terminal is repeatedly exempted from the concrete implementation of password access and had a variety of.For example, after the password access is exempted from the terminal, obtain the identification information at this terminal, judge the local identical identification information of whether having preserved.If, represent that then this terminal is not to exempt from cipher authentication first to insert, if not, represent that this terminal exempts from cipher authentication first and insert, preserve the identification information at this terminal.
Among the embodiment, the maximum that above-mentioned predetermined number N equals to allow several M that access terminal.Then access processing method is as shown in Figure 2, comprises following operation:
Step 200, receive first enable signal after, switch to first access module;
Step 210, under first access module, cipher authentication is exempted from the terminal of predetermined number N inserts, obtain and preserve and exempt from the identification information that cipher authentication accesses terminal;
Step 220, reach predetermined number N, switch to second access module when exempting from the number that cipher authentication accesses terminal;
Step 230, under second access module, the identification information at the terminal that the request of obtaining inserts judges whether the identification information at terminal of this request access identical with the identification information of a preservation;
If execution in step 240, the terminal that this request is inserted are exempted from cipher authentication and are inserted;
Otherwise, execution in step 250, refuse the access request at the terminal that this request inserts.
Wherein, the current access module information of automatic preservation during the device shutdown, the access module before entering is shut down automatically after installing start once more.In addition, when the device shutdown, the identification information of having preserved is not deleted.
The implementation that the cipher authentication access is exempted from the terminal of control predetermined number has a variety of.Specifically can repeat no more here with reference to the description of a last embodiment.
On the basis of above-mentioned two embodiment.The method that the embodiment of the invention provides can also comprise: after receiving second enable signal, and the identification information at the terminal of exempting from the cipher authentication access that deletion is preserved, and switch to the 3rd access module.Under the 3rd access module, the mode that the terminal is inserted processing has multiple.Give an example below several kinds:
(1) under the 3rd access module, in the maximum that allows accessed terminal the scope of several M, the terminal that request is inserted was carried out cipher authentication and is inserted.
Concrete, if the terminal number of current access does not reach the maximum of permission several M that access terminal, the terminal of then request being inserted is carried out cipher authentication and is inserted, otherwise, the access request at refusal terminal.
(2) under the 3rd access module, in the maximum that allows accessed terminal the scope of several M, the terminal that request is inserted was exempted from cipher authentication and is inserted.
Concrete, if the terminal number of current access does not reach the maximum of permission several M that access terminal, the terminal of then request being inserted is exempted from cipher authentication and is inserted, otherwise, the access request at refusal terminal.
Under the 3rd access module, can also can set concrete access way according to concrete which kind of access way that adopts of the Default Value decision of device according to user's actual demand.
Among the embodiment, be example, the access way of the embodiment of the invention is elaborated with the WIFI access.Suppose to provide the device of WIFI access function to be preset with three kinds of access modules, and above-mentioned predetermined number N is 1, less than the maximum that allows several M that access terminal.
Under first access module, only allow a terminal to insert the WIFI network, and preserve the identification information at this terminal through the mode of exempting from cipher authentication.
Under second access module, the terminal that only allows in device, to have preserved identification information is exempted from cipher authentication and is inserted the WIFI network, for other-end, if allow it to insert then need the cipher authentication access network.
Under the 3rd access module, according to the actual disposition of device, in the maximum that allows accesses terminal the scope of several M; All terminals all need cipher authentication to insert the WIFI network; Perhaps, in the maximum that allows accessed terminal the scope of several M, all terminals were all exempted from cipher authentication and are inserted the WIFI network.
Switching between above-mentioned three kinds of access modules is as shown in Figure 3, can pass through first enable signal, switches to first access module from the 3rd access module.Can pass through second enable signal, switch to the 3rd access module from first access module or second access module.Insert the WIFI network as a terminal through exempting from the cipher authentication mode, switch to second access module from first access module.Because under first access module and second access module, specific terminal can be in order to avoid cipher authentication be realized access fast.Therefore, also can think and trigger quick access function, specifically through being operated in first access module and second access module is realized quick access function through first enable signal.Think and close quick access function through second enable signal.
Accordingly, WIFI network insertion processing method is as shown in Figure 4, specifically comprises following operation:
Step 400, reception first enable signal switch to first access module.
Concrete, this first enable signal is triggered through hardware or software mode by the user.
The access request of step 410, receiving terminal A is exempted from cipher authentication to terminal A and is inserted, and obtains and preserves the identification information of terminal A, and switch to second access module.
Wherein, the identification information at terminal can but be not limited only to be MAC Address, IP address, phone number or the like can be in access network the unique identification terminal information.
Under second access module, if there is terminal request to insert the WIFI network, the identification information at terminal is obtained in the access request of execution in step 420, receiving terminal, judges whether the identification information at this terminal is identical with the identification information of a preservation;
If execution in step 430, cipher authentication exempted from this terminal insert.
Otherwise, execution in step 440, judge whether the terminal number of current access reaches P (P=M-N).
If execution in step 450, refuse the access request at this terminal.
Otherwise, execution in step 460, cipher authentication carried out at this terminal insert.
Terminal A possibly (for example shut down) for some reason and withdraw from the WIFI network after exempting from cipher authentication access WIFI network.When terminal A asks to insert the WIFI network once more,, then can for providing, terminal A exempt from the cipher authentication access through the identification information comparison if be in second access module.
Because identification information can the unique identification terminal; Therefore the access way that provides of the embodiment of the invention; Under second access module; Through the identification information matching mode authentication is carried out at the terminal that request inserts, not only improved access speed, also improved the fail safe that inserts than the access way of cipher authentication.
Under above-mentioned first access module or second access module, if receive second enable signal, then switch to the 3rd access module, and delete the identification information of having preserved.
For example, the terminal use need insert the WIFI network through the mode of exempting from cipher authentication fast through triggering first enable signal under first access module.Carried out exempting from the cipher authentication access but there is other-end to try to be the first.At this moment, this terminal use can be through triggering second enable signal, the identification information that deletion is preserved.And trigger first enable signal once more, attempt under first access module, inserting the WIFI network through the mode of exempting from cipher authentication fast.
Among the embodiment, be example, the access way of the embodiment of the invention is elaborated with the WIFI access.Suppose to provide the device of WIFI access function to be preset with three kinds of access modules, the maximum that above-mentioned predetermined number N equals to allow several M that access terminal.
Under first access module, allow N terminal to insert the WIFI network, and preserve the identification information at each terminal through the mode of exempting from cipher authentication.
Under second access module, cipher authentication access WIFI network is exempted from the terminal that only allows in device, to have preserved identification information.
Under the 3rd access module, according to the actual disposition of device, in the maximum that allows accesses terminal several M scopes; All terminals all need cipher authentication to insert the WIFI network; Perhaps, in the maximum that allows accessed terminal several M scopes, all terminals were all exempted from cipher authentication and are inserted the WIFI network.
Switching between above-mentioned three kinds of access modules is as shown in Figure 3, can pass through first enable signal, switches to first access module from the 3rd access module.Can pass through second enable signal, switch to the 3rd access module from first access module or second access module.Insert the WIFI network as N terminal through exempting from the cipher authentication mode, switch to second access module from first access module.Because under first access module and second access module, specific terminal can be in order to avoid cipher authentication be realized access fast.Therefore, also can think and trigger quick access function, specifically through being operated in first access module and second access module is realized quick access function through first enable signal.Think and close quick access function through second enable signal.
Accordingly, WIFI network insertion processing method is as shown in Figure 5, specifically comprises following operation:
Step 500, receive first enable signal, switch to first access module, exempt from the access terminal Counter Value of number of cipher authentication and be set to initial value 0.
Concrete, this first enable signal is triggered through hardware or software mode by the user.
The access request of step 510, receiving terminal is exempted from cipher authentication to this terminal and is inserted, and obtains the identification information at this terminal.
Wherein, the identification information at terminal can but be not limited only to MAC Address, IP address, phone number or the like can be in access network the unique identification terminal information.
Whether preserved the identification information at this terminal in step 520, the judgment means, if, execution in step 540, otherwise, execution in step 530.
Step 530, preserve the identification information at this terminal, and Counter Value is added 1, execution in step 540;
Step 540, judge whether Counter Value reaches predetermined number N, if, switch to second access module, otherwise, step 510 returned.
Under second access module, if there is terminal request to insert the WIFI network, the identification information at terminal is obtained in the access request of execution in step 550, receiving terminal, judges whether the identification information at this terminal is identical with the identification information of a preservation;
If execution in step 560, cipher authentication exempted from this terminal insert.
Otherwise, execution in step 570, refuse the access request at this terminal.
Terminal A possibly (for example shut down) for some reason and withdraw from the WIFI network after exempting from cipher authentication access WIFI network.When terminal A asks to insert the WIFI network once more,, then can for providing, terminal A exempt from the cipher authentication access through the identification information comparison if be in second access module.
Because identification information can the unique identification terminal; Therefore the access way that provides of the embodiment of the invention; Under second access module; Through the identification information matching mode authentication is carried out at the terminal that request inserts, not only improved access speed, also improved the fail safe that inserts than the access way of cipher authentication.
Under above-mentioned first access module or second access module, if receive second enable signal, then switch to the 3rd access module, and delete the identification information of having preserved.
For example, the terminal use need insert the WIFI network through the mode of exempting from cipher authentication fast through triggering first enable signal under first access module.Carried out exempting from the cipher authentication access but there is other-end to try to be the first.At this moment, this terminal use can be through triggering second enable signal, the identification information that deletion is preserved.And trigger first enable signal once more, attempt under first access module, inserting the WIFI network through the mode of exempting from cipher authentication fast.
The embodiment of the invention provides a kind of access processing unit, and its implementation structure is as shown in Figure 6, specifically comprises:
Access module handover module 60, be used to receive first enable signal after, control inserts processing module 61 and switches to first access module;
Insert processing module 61, be used under first access module, cipher authentication is exempted from the terminal of predetermined number insert.
The device that provides through the embodiment of the invention when if the terminal use needs to insert (like the WIFI network), can trigger first enable signal, so that under first access module, exempts from cipher authentication and inserts.
Preferable, said access processing module 61 also is used for, and under first access module, obtains and preserves and exempt from the identification information that cipher authentication accesses terminal.Reach said predetermined number when exempting from the number that cipher authentication accesses terminal, access module handover module 60 also is used for, and control inserts processing module 61 and switches to second access module.Insert processing module 61 and also be used under second access module, the identification information at the terminal that the request of obtaining inserts judges whether the identification information at the terminal that described request inserts is identical with the identification information of a preservation; If the cipher authentication access is exempted from the terminal that described request inserts.
Preferable; Under second access module, if the identification information of the identification information at the terminal that above-mentioned request inserts and preservation is all inequality, insert processing module 61 and also be used for: whether the terminal number of judging current access reaches P; If; The access request at the terminal that rejecting said request inserts, otherwise, the cipher authentication access is carried out at the terminal that described request inserts; Wherein, P=M-N, M is the maximum that the allows number that accesses terminal.
Preferable, said access processing module 61 also is used for, and under first access module, obtains and preserves and exempt from the identification information that cipher authentication accesses terminal.Reach said predetermined number when exempting from the number that cipher authentication accesses terminal, access module handover module 60 also is used for, and control inserts processing module 61 and switches to second access module.Insert processing module 61 and also be used under second access module, the identification information at the terminal that the request of obtaining inserts judges whether the identification information at the terminal that described request inserts is identical with the identification information of a preservation; If the cipher authentication access is exempted from the terminal that described request inserts; Otherwise, refuse the access request at said terminal.
Preferable, said access module handover module 60 also is used for, receive second enable signal after, deletion inserts that processing module 61 preserves exempts from the identification information at the terminal that cipher authentication inserts, and control inserts processing module 61 and switches to the 3rd access module.Insert processing module 61 and can also be used under the 3rd access module, in the maximum that allows accesses terminal several scopes, the cipher authentication access is carried out at the terminal that request inserts.Insert processing module 61 and also can be used under the 3rd access module, in the maximum that allows accesses terminal several scopes, the cipher authentication access is exempted from the terminal that request inserts.
Concrete access way under the 3rd access module can repeat no more with reference to the description of said method embodiment here.
The method and apparatus that the embodiment of the invention provides can be applied to the WIFI access network.Specifically can be that the wired commentaries on classics WIFI network of RJ45 (a kind of Ethernet interface), 2G (second generation GSM)/3G (3-G (Generation Three mobile communication system))/LTE (Long Term Evolution) change the WIFI network, WIFI changes WIFI network or the like; Accordingly, device provided by the invention is the AP (access point) that the WIFI access function is provided.
The method and apparatus that the embodiment of the invention provides also can be applied to other access networks.For example, Microcell inserts, and corresponding, device provided by the invention is a microcell base station.Perhaps, local area network (LAN) inserts, and corresponding, device provided by the invention is a LAN gateway.Perhaps, the Internet is inserted at the terminal in the local area network (LAN), and corresponding, device provided by the invention is a LAN gateway.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, belong within the scope of claim of the present invention and equivalent technologies thereof if of the present invention these are revised with modification, then the present invention also is intended to comprise these changes and modification interior.

Claims (10)

1. an access processing method is characterized in that, comprising:
After receiving first enable signal, switch to first access module;
Under first access module, cipher authentication is exempted from the terminal of predetermined number N insert.
2. method according to claim 1 is characterized in that, this method also comprises:
Under first access module, obtain and preserve and exempt from the identification information that cipher authentication accesses terminal;
Reach said predetermined number N when exempting from the number that cipher authentication accesses terminal, switch to second access module;
Under second access module, the identification information at the terminal that the request of obtaining inserts judges whether the identification information at the terminal that described request inserts is identical with the identification information of a preservation;
If the cipher authentication access is exempted from the terminal that described request inserts.
3. method according to claim 2 is characterized in that, under second access module, if the identification information of the identification information at the terminal that described request inserts and preservation is all inequality, this method also comprises:
Whether the terminal number of judging current access reaches P, if, the access request at the terminal that rejecting said request inserts, otherwise, the cipher authentication access is carried out at the terminal that described request inserts; Wherein, P=M-N, M is the maximum that the allows number that accesses terminal.
4. method according to claim 1 is characterized in that, this method also comprises:
Under first access module, obtain and preserve and exempt from the identification information that cipher authentication accesses terminal;
Reach said predetermined number when exempting from the number that cipher authentication accesses terminal, switch to second access module;
Under second access module, the identification information at the terminal that the request of obtaining inserts judges whether the identification information at the terminal that described request inserts is identical with the identification information of a preservation;
If the cipher authentication access is exempted from the terminal that described request inserts; Otherwise, refuse the access request at said terminal.
5. according to each described method of claim 2 ~ 4, it is characterized in that this method also comprises:
After receiving second enable signal, the identification information at the terminal of exempting from the cipher authentication access that deletion is preserved, and switch to the 3rd access module;
Under the 3rd access module, in the maximum that allows accesses terminal several scopes, the cipher authentication access is carried out at the terminal that request inserts; Perhaps, under the 3rd access module, in the maximum that allows accesses terminal several scopes, the cipher authentication access is exempted from the terminal that request inserts.
6. an access processing unit is characterized in that, comprising:
The access module handover module, be used to receive first enable signal after, control inserts processing module and switches to first access module;
Insert processing module, be used under first access module, cipher authentication is exempted from the terminal of predetermined number insert.
7. device according to claim 6 is characterized in that, said access processing module also is used for:
Under first access module, obtain and preserve and exempt from the identification information that cipher authentication accesses terminal;
Reach said predetermined number when exempting from the number that cipher authentication accesses terminal, said access module handover module also is used for, and controls said access processing module and switches to second access module;
Said access processing module also is used for:
Under second access module, the identification information at the terminal that the request of obtaining inserts judges whether the identification information at the terminal that described request inserts is identical with the identification information of a preservation;
If the cipher authentication access is exempted from the terminal that described request inserts.
8. device according to claim 7 is characterized in that, under second access module, if the identification information of the identification information at the terminal that described request inserts and preservation is all inequality, said access processing module also is used for:
Whether the terminal number of judging current access reaches P, if, the access request at the terminal that rejecting said request inserts, otherwise, the cipher authentication access is carried out at the terminal that described request inserts; Wherein, P=M-N, M is the maximum that the allows number that accesses terminal.
9. device according to claim 6 is characterized in that, said access processing module also is used for:
Under first access module, obtain and preserve and exempt from the identification information that cipher authentication accesses terminal;
Reach said predetermined number when exempting from the number that cipher authentication accesses terminal, said access module handover module also is used for, and controls said access processing module and switches to second access module;
Said access processing module also is used for:
Under second access module, the identification information at the terminal that the request of obtaining inserts judges whether the identification information at the terminal that described request inserts is identical with the identification information of a preservation;
If the cipher authentication access is exempted from the terminal that described request inserts; Otherwise, refuse the access request at said terminal.
10. according to each described device of claim 7 ~ 9, it is characterized in that said access module handover module also is used for:
After receiving second enable signal, deletion is preserved exempts from the identification information at the terminal that cipher authentication inserts, and controls said access processing module and switch to the 3rd access module;
Under the 3rd access module, in the maximum that allows accesses terminal several scopes, the cipher authentication access is carried out at the terminal that request inserts; Perhaps, under the 3rd access module, in the maximum that allows accesses terminal several scopes, the cipher authentication access is exempted from the terminal that request inserts.
CN201210231214.0A 2012-07-04 2012-07-04 Access processing method and device Active CN102791016B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210231214.0A CN102791016B (en) 2012-07-04 2012-07-04 Access processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210231214.0A CN102791016B (en) 2012-07-04 2012-07-04 Access processing method and device

Publications (2)

Publication Number Publication Date
CN102791016A true CN102791016A (en) 2012-11-21
CN102791016B CN102791016B (en) 2014-12-10

Family

ID=47156295

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210231214.0A Active CN102791016B (en) 2012-07-04 2012-07-04 Access processing method and device

Country Status (1)

Country Link
CN (1) CN102791016B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103765855A (en) * 2013-09-13 2014-04-30 华为终端有限公司 Processing method of wireless network equipment, wireless network equipment and processor
CN104350705A (en) * 2014-03-13 2015-02-11 华为终端有限公司 Wireless router and communication mode switching method thereof
CN104469764A (en) * 2013-09-16 2015-03-25 中兴通讯股份有限公司 WLAN (Wireless Local Area Network) networking method and system
CN104837175A (en) * 2015-04-01 2015-08-12 普联技术有限公司 Wireless router access control method and device
CN105848147A (en) * 2015-07-28 2016-08-10 维沃移动通信有限公司 Network connection method and device, and Wi-Fi routing equipment
US9674768B2 (en) 2014-07-28 2017-06-06 Xiaomi Inc. Method and device for accessing wireless network
CN108990133A (en) * 2018-08-02 2018-12-11 中国联合网络通信集团有限公司 A kind of wireless network access method and system
CN109151818A (en) * 2018-08-07 2019-01-04 西安易朴通讯技术有限公司 A kind of terminal verification method, AP equipment, terminal and system
CN109981681A (en) * 2019-04-10 2019-07-05 广东虹勤通讯技术有限公司 A kind of wireless network access method and Wireless networking systems
US10616232B2 (en) 2014-05-31 2020-04-07 Huawei Technologies Co., Ltd. Network connection method, hotspot terminal and management terminal
WO2021036558A1 (en) * 2019-08-23 2021-03-04 Oppo广东移动通信有限公司 Wireless network connection method and related apparatus

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070200665A1 (en) * 2004-01-06 2007-08-30 Kaba Ag Access control system and method for operating said system
CN101192916A (en) * 2006-11-23 2008-06-04 华为技术有限公司 Wireless access method and wireless access device
CN101610577A (en) * 2008-06-18 2009-12-23 中兴通讯股份有限公司 The access control apparatus of Wireless Telecom Equipment and connection control method thereof
CN101895855A (en) * 2009-05-18 2010-11-24 中国移动通信集团公司 Mobile terminal access method, base station and access system
CN101895962A (en) * 2010-08-05 2010-11-24 华为终端有限公司 Wi-Fi (wireless fidelity) access method, access point and Wi-Fi access system
CN102056154A (en) * 2009-10-30 2011-05-11 华为技术有限公司 IKE (Internet Key Exchange) authentication method and system, IKE response equipment and IKE initiating equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070200665A1 (en) * 2004-01-06 2007-08-30 Kaba Ag Access control system and method for operating said system
CN101192916A (en) * 2006-11-23 2008-06-04 华为技术有限公司 Wireless access method and wireless access device
CN101610577A (en) * 2008-06-18 2009-12-23 中兴通讯股份有限公司 The access control apparatus of Wireless Telecom Equipment and connection control method thereof
CN101895855A (en) * 2009-05-18 2010-11-24 中国移动通信集团公司 Mobile terminal access method, base station and access system
CN102056154A (en) * 2009-10-30 2011-05-11 华为技术有限公司 IKE (Internet Key Exchange) authentication method and system, IKE response equipment and IKE initiating equipment
CN101895962A (en) * 2010-08-05 2010-11-24 华为终端有限公司 Wi-Fi (wireless fidelity) access method, access point and Wi-Fi access system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
孙鹏: "可信无线接入认证模型的研究与设计", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107086999A (en) * 2013-09-13 2017-08-22 华为终端有限公司 Processing method, Wireless Communication Equipment and its processor of Wireless Communication Equipment
CN107086999B (en) * 2013-09-13 2020-09-11 华为终端有限公司 Processing method of wireless network equipment, wireless network equipment and processor thereof
CN103765855A (en) * 2013-09-13 2014-04-30 华为终端有限公司 Processing method of wireless network equipment, wireless network equipment and processor
US9503896B2 (en) 2013-09-13 2016-11-22 Huawei Device Co., Ltd. Processing method of wireless network device, wireless network device, and processor of wireless network device
CN103765855B (en) * 2013-09-13 2017-05-24 华为终端有限公司 Processing method of wireless network equipment, wireless network equipment and processor
CN104469764A (en) * 2013-09-16 2015-03-25 中兴通讯股份有限公司 WLAN (Wireless Local Area Network) networking method and system
CN104350705A (en) * 2014-03-13 2015-02-11 华为终端有限公司 Wireless router and communication mode switching method thereof
CN104350705B (en) * 2014-03-13 2018-06-05 华为终端有限公司 A kind of method of wireless router and its switch communication mode
US10616232B2 (en) 2014-05-31 2020-04-07 Huawei Technologies Co., Ltd. Network connection method, hotspot terminal and management terminal
US11310239B2 (en) 2014-05-31 2022-04-19 Huawei Technologies Co., Ltd. Network connection method, hotspot terminal and management terminal
US9674768B2 (en) 2014-07-28 2017-06-06 Xiaomi Inc. Method and device for accessing wireless network
CN104837175B (en) * 2015-04-01 2018-09-25 普联技术有限公司 A kind of connection control method and device of wireless router
CN104837175A (en) * 2015-04-01 2015-08-12 普联技术有限公司 Wireless router access control method and device
CN105848147A (en) * 2015-07-28 2016-08-10 维沃移动通信有限公司 Network connection method and device, and Wi-Fi routing equipment
CN108990133A (en) * 2018-08-02 2018-12-11 中国联合网络通信集团有限公司 A kind of wireless network access method and system
CN109151818A (en) * 2018-08-07 2019-01-04 西安易朴通讯技术有限公司 A kind of terminal verification method, AP equipment, terminal and system
WO2020029498A1 (en) * 2018-08-07 2020-02-13 西安易朴通讯技术有限公司 Terminal verification method, and ap device, terminal and system
US11582606B2 (en) 2018-08-07 2023-02-14 Xi'an Yep Telecommunication Technology, Ltd. Terminal verification method, and AP device, terminal and system
CN109981681A (en) * 2019-04-10 2019-07-05 广东虹勤通讯技术有限公司 A kind of wireless network access method and Wireless networking systems
WO2021036558A1 (en) * 2019-08-23 2021-03-04 Oppo广东移动通信有限公司 Wireless network connection method and related apparatus

Also Published As

Publication number Publication date
CN102791016B (en) 2014-12-10

Similar Documents

Publication Publication Date Title
CN102791016B (en) Access processing method and device
EP3691178B1 (en) Handover method and mobility management network element
EP3780538A1 (en) Method and device for managing and controlling terminal ue
US9705883B2 (en) Communications terminal and system and rights management method
CN106134231B (en) Key generation method, equipment and system
CN105850183B (en) Wireless network access control method, device and system
EP2793496A1 (en) Identity module with interchangeable unique identifiers
US10448286B2 (en) Mobility in mobile communications network
CN112822756B (en) Communication method, system, base station and terminal
CN105635084A (en) Apparatus and method for authenticating terminal
EP3695632B1 (en) Transfer of protected configuration data from home mobile network
US9769659B2 (en) Access control for a wireless local area network
CN109068330B (en) Pseudo base station identification processing method, device and storage medium
CN108616805B (en) Emergency number configuration and acquisition method and device
RU2602341C2 (en) Method and device for informing on plmn id
CN104394577A (en) Wireless network access method of wireless route equipment and electronic equipment
CN105451274A (en) Network convergence preprocessing method, device and system
CN103841625A (en) WLAN access method and WLAN access device
US20140357315A1 (en) Next generation smart card
CA2975407A1 (en) Processing method for service flow packet, and apparatus
CN116017454A (en) Authentication method, device, equipment and storage medium based on service access
CN107333322B (en) Parent control method and base station
CN107968996B (en) Method for obtaining IMSI, target cell and source cell
CN105357671A (en) System and method for connecting wireless access points with same SSID and different passwords
KR101809239B1 (en) Apn changing apparatus and method, wireless terminal for apn change and record medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant