CN103957103A - Safety authentication method and device and mobile terminal - Google Patents

Safety authentication method and device and mobile terminal Download PDF

Info

Publication number
CN103957103A
CN103957103A CN201410156336.7A CN201410156336A CN103957103A CN 103957103 A CN103957103 A CN 103957103A CN 201410156336 A CN201410156336 A CN 201410156336A CN 103957103 A CN103957103 A CN 103957103A
Authority
CN
China
Prior art keywords
wireless
trusted
reliability rating
identification information
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410156336.7A
Other languages
Chinese (zh)
Other versions
CN103957103B (en
Inventor
张鹏飞
夏勇峰
屈恒
王益冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Technology Co Ltd
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201410156336.7A priority Critical patent/CN103957103B/en
Publication of CN103957103A publication Critical patent/CN103957103A/en
Application granted granted Critical
Publication of CN103957103B publication Critical patent/CN103957103B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a safety authentication method and device and mobile terminal, and belongs to the technical field of the Internet. The method comprises the steps that the signals broadcasted by at least one wireless device are monitored, wherein the signal broadcasted by each wireless device at least carries the identification information of the corresponding wireless device; whether one wireless device is a trusted device or not is determined according to the identification information carried in the received signals broadcasted by the corresponding wireless device; if the wireless device is the trusted device, the trust level of the wireless device is determined, and authentication is conducted by a corresponding safety authentication mode according to the trust level of the wireless device, wherein different trust levels correspond to different safety authentication modes, and the authentication steps of the safety authentication mode corresponding to each trust level are less than the authentication steps of a preset authentication mode. According to the safety authentication method, device and mobile terminal, the trust levels of the wireless devices are determined, so that the corresponding safety authentication modes are used for conducting authentication according to the trust levels of the wireless devices, and the flexible authentication method is provided.

Description

Method, device and the mobile terminal of safety verification
Technical field
The present invention relates to Internet technical field, particularly a kind of method of safety verification, device and mobile terminal.
Background technology
Along with the development of Internet technology, increasing user carries out information interchange by terminal.When carrying out information interchange by terminal, in terminal, may store the information that some relate to privacy of user, therefore, in order to protect user's privacy, conventionally need to carry out safe setting to terminal.For example, can startup password, screen locking password etc. be set to terminal.But after terminal being carried out to safety setting, how terminal is carried out to safety verification, become and affect the key that user experiences.
Be set to arrange password as example taking safety, correlation technique is in the time carrying out safety verification, in the following way: first store the authentication password that user sets in advance, and then in the time that being operated, terminal provides Password Input dialog box, and mate by the authentication password that the password getting is set in advance with user, thereby realized safety verification from Password Input dialog box.Particularly, if the authentication password that the password in Password Input dialog box sets in advance with user is mated, be verified.In addition, correlation technique is in the time carrying out safety verification, and no matter terminal is current under which kind of environment, all needs to adopt above-mentioned safe verification method to verify.
Realizing in process of the present invention, inventor finds that correlation technique at least exists following problem:
Because correlation technique is when the safety verification, no matter current under which kind of environment, all need in Password Input dialog box, input password, and mate and verify by the authentication password that the password in Password Input dialog box is set in advance with user, cause the verification mode underaction of correlation technique.
Summary of the invention
In order to solve the problem of correlation technique, the embodiment of the present invention provides a kind of method, device and mobile terminal of safety verification.Described technical scheme is as follows:
First aspect, provides a kind of method of safety verification, and described method comprises:
Monitor the signal of at least one broadcast by wireless devices, wherein, in the signal of each broadcast by wireless devices, at least carry the identification information of each wireless device;
Determine according to the identification information carrying in the signal of the broadcast by wireless devices receiving whether described wireless device is trusted device;
If described wireless device is trusted device, determines the reliability rating of described wireless device, and adopt corresponding safety verification mode to verify according to the reliability rating of described wireless device;
Wherein, the safety verification mode that different reliability rating is corresponding different, and the verification step of safety verification mode corresponding to every kind of reliability rating is less than the verification step of default verification mode.
In conjunction with first aspect, in the possible implementation of the first of first aspect, the identification information carrying in the signal of the broadcast by wireless devices that described basis receives determines that whether described wireless device is trusted device, comprising:
The identification information carrying in the signal of the broadcast by wireless devices receiving is mated with the identification information of pre-stored trusted device;
If the identification information carrying in the signal of the broadcast by wireless devices receiving mates with the identification information of pre-stored trusted device, determine that described wireless device is trusted device.
In conjunction with first aspect, in the possible implementation of the second of first aspect, before the described reliability rating of determining described wireless device, also comprise:
Be that each trusted device arranges different reliability ratings according to the trusting degree of each trusted device, and store the corresponding relation between device identification and the reliability rating of every kind of trusted device;
The described reliability rating of determining described wireless device, comprising:
Determine the reliability rating corresponding to identification information of described wireless device according to the corresponding relation between the device identification of every kind of trusted device and reliability rating, obtain the reliability rating of described wireless device.
In conjunction with first aspect, in the third possible implementation of first aspect, the identification information carrying in the signal of the broadcast by wireless devices that described basis receives determines that whether described wireless device is after trusted device, also comprises:
If described wireless device is trustless equipment, adopt default verification mode to verify.
In conjunction with first aspect, in the 4th kind of possible implementation of first aspect, the described reliability rating according to described wireless device adopts after corresponding safety verification mode verifies, also comprises:
Upgrade the reliability rating of described wireless device, and in the time carrying out safety verification by described wireless device next time, safety verification mode corresponding to reliability rating after upgrading according to described wireless device verified.
Second aspect, provides a kind of device of safety verification, and described device comprises:
Monitor module, for monitoring the signal of at least one broadcast by wireless devices, wherein, in the signal of each broadcast by wireless devices, at least carry the identification information of each wireless device;
The first determination module, determines for the identification information carrying according to the signal of the broadcast by wireless devices receiving whether described wireless device is trusted device;
The second determination module, in the time that described wireless device is trusted device, determines the reliability rating of described wireless device;
Authentication module, for adopting corresponding safety verification mode to verify according to the reliability rating of described wireless device;
Wherein, the safety verification mode that different reliability rating is corresponding different, and the verification step of safety verification mode corresponding to every kind of reliability rating is less than the verification step of default verification mode.
In conjunction with second aspect, in the possible implementation of the first of second aspect, described the first determination module, comprising:
Matching unit, mates with the identification information of pre-stored trusted device for identification information that the signal of the broadcast by wireless devices receiving is carried;
Determining unit, when the identification information carrying mates with the identification information of pre-stored trusted device, determines that described wireless device is trusted device for the signal when the broadcast by wireless devices receiving.
In conjunction with second aspect, in the possible implementation of the second of second aspect, described device, also comprises:
Module is set, for being that each trusted device arranges different reliability ratings according to the trusting degree of each trusted device;
Memory module, for storing the corresponding relation between device identification and the reliability rating of every kind of trusted device;
Described the second determination module, for determine the reliability rating corresponding to identification information of described wireless device according to the corresponding relation between the device identification of every kind of trusted device and reliability rating, obtains the reliability rating of described wireless device.
In conjunction with second aspect, in the third possible implementation of second aspect, described authentication module, also in the time that described wireless device is trustless equipment, adopts default verification mode to verify.
In conjunction with second aspect, in the 4th kind of possibility implementation of second aspect, described device, also comprises:
Update module, for upgrading the reliability rating of described wireless device;
Described authentication module, also in the time carrying out safety verification by described wireless device next time, safety verification mode corresponding to reliability rating after upgrading according to described wireless device verified.
According to the third aspect of disclosure embodiment, a kind of mobile terminal is provided, described mobile terminal includes memory, and one or more than one program, one of them or more than one program are stored in memory, and be configured to be carried out by more than one or one processor, described more than one or one program package contains for carrying out the instruction of following operation:
Monitor the signal of at least one broadcast by wireless devices, wherein, in the signal of each broadcast by wireless devices, at least carry the identification information of each wireless device;
Determine according to the identification information carrying in the signal of the broadcast by wireless devices receiving whether described wireless device is trusted device;
If described wireless device is trusted device, determines the reliability rating of described wireless device, and adopt corresponding safety verification mode to verify according to the reliability rating of described wireless device;
Wherein, the safety verification mode that different reliability rating is corresponding different, and the verification step of safety verification mode corresponding to every kind of reliability rating is less than the verification step of default verification mode.
The beneficial effect that the technical scheme that the embodiment of the present invention provides is brought is:
By monitoring the signal of the identification information that carries each wireless device of at least one broadcast by wireless devices, and determine that according to the identification information carrying in the signal of the broadcast by wireless devices receiving wireless device is after trusted device, determine the reliability rating of wireless device, and then adopt corresponding safety verification mode to verify according to the reliability rating of wireless device.Due to safety verification mode corresponding to different reliability ratings, therefore, provide one safe verification method flexibly.
Should be understood that, it is only exemplary that above general description and details are hereinafter described, and can not limit the disclosure.
Brief description of the drawings
Accompanying drawing is herein merged in specification and forms the part of this specification, shows embodiment according to the invention, and is used from and explains principle of the present invention with specification one.
Fig. 1 is according to the flow chart of the method for a kind of safety verification shown in an exemplary embodiment.
Fig. 2 is according to the flow chart of the method for a kind of safety verification shown in an exemplary embodiment.
Fig. 3 is according to the schematic diagram of the device of a kind of safety verification shown in an exemplary embodiment.
Fig. 4 is according to the schematic diagram of the first determination module shown in an exemplary embodiment.
Fig. 5 is according to the schematic diagram of the device of a kind of safety verification shown in an exemplary embodiment.
Fig. 6 is according to the schematic diagram of the device of a kind of safety verification shown in an example row embodiment.
Fig. 7 is according to the block diagram of a kind of terminal shown in an exemplary embodiment.
Embodiment
Here will at length describe exemplary embodiment, its sample table shows in the accompanying drawings.When description below relates to accompanying drawing, unless separately there is expression, the same numbers in different accompanying drawings represents same or analogous key element.Execution mode described in following exemplary embodiment does not represent all execution modes consistent with the present invention.On the contrary, they are only and the example of apparatus and method as consistent in some aspects that described in detail in appended claims, of the present disclosure.
Fig. 1 is according to the flow chart of the method for a kind of safety verification shown in an exemplary embodiment, and as shown in Figure 1, the method for this safety verification is for mobile terminal, and the method for this safety verification comprises the following steps.
In step 101, monitor the signal of at least one broadcast by wireless devices, wherein, in the signal of each broadcast by wireless devices, at least carry the identification information of each wireless device.
In step 102, determine according to the identification information carrying in the signal of the broadcast by wireless devices receiving whether wireless device is trusted device.
In one embodiment, determine that according to the identification information carrying in the signal of the broadcast by wireless devices receiving whether wireless device is trusted device, comprising:
The identification information carrying in the signal of the broadcast by wireless devices receiving is mated with the identification information of pre-stored trusted device;
If the identification information carrying in the signal of the broadcast by wireless devices receiving mates with the identification information of pre-stored trusted device, determine that wireless device is trusted device.
In step 103, if wireless device is trusted device, determine the reliability rating of wireless device, and adopt corresponding safety verification mode to verify according to the reliability rating of wireless device, wherein, the safety verification mode that different reliability rating is corresponding different, and the verification step of safety verification mode corresponding to every kind of reliability rating is less than the verification step of default verification mode.
In one embodiment, before determining the reliability rating of wireless device, also comprise:
Be that each trusted device arranges different reliability ratings according to the trusting degree of each trusted device, and store the corresponding relation between device identification and the reliability rating of every kind of trusted device;
The reliability rating of determining wireless device, comprising:
Determine the reliability rating corresponding to identification information of wireless device according to the corresponding relation between the device identification of every kind of trusted device and reliability rating, obtain the reliability rating of wireless device.
In one embodiment, determine that according to the identification information carrying in the signal of the broadcast by wireless devices receiving whether wireless device is after trusted device, also comprises:
If wireless device is trustless equipment, adopt default verification mode to verify.
In one embodiment, adopt after corresponding safety verification mode verifies according to the reliability rating of wireless device, also comprise:
Upgrade the reliability rating of wireless device, and in the time carrying out safety verification by wireless device next time, safety verification mode corresponding to reliability rating after upgrading according to wireless device verified.
The method that disclosure embodiment provides, by monitoring the signal of the identification information that carries each wireless device of at least one broadcast by wireless devices, and determine that according to the identification information carrying in the signal of the broadcast by wireless devices receiving wireless device is after trusted device, determine the reliability rating of wireless device, and then adopt corresponding safety verification mode to verify according to the reliability rating of wireless device.Due to safety verification mode corresponding to different reliability ratings, therefore, provide one safe verification method flexibly.
Fig. 2 is according to the flow chart of the method for a kind of safety verification shown in an exemplary embodiment, and the method for this safety verification is for mobile terminal.Referring to Fig. 2, disclosure embodiment provides the method for safety verification to comprise the following steps:
In step 201, monitor the signal of at least one broadcast by wireless devices, in the signal of each broadcast by wireless devices, at least carry the identification information of each wireless device.
After each wireless device unlatching, for and other equipment around between connect, each wireless device can broadcast singal, the method of the safety verification that the present embodiment provides is to carry out safety verification according to the signal of broadcast by wireless devices, therefore, in order realizing, the safety of mobile terminal to be verified, before carrying out safety verification, to be needed the signal of monitoring wireless device broadcasts.Again because the wireless device existing under same environment may be one, also may be multiple, and each wireless device all can broadcast singal, therefore, in order to improve the reliability of safety verification, in the time of the signal of monitoring wireless device broadcasts, need to monitor the signal of at least one broadcast by wireless devices.Wherein, wireless device includes but not limited to that the present embodiment is not done concrete restriction to wireless device into router, wearable nearly body equipment etc.
Because the form of different broadcast by wireless devices signals is different, therefore, the mode adopting in the time monitoring the wireless signal of different broadcast by wireless devices is also different.Particularly, in the time that wireless device is router, monitor the mode of the signal of at least one broadcast by wireless devices, include but not limited to opening network linkage function, detect the signal whether in current environment with network connection password by network connecting function, if detect in current environment and there is the signal that network connects password, judge the signal that listens to router broadcast; If do not detect in current environment and there is the signal that network connects password, judge the signal that does not hear router broadcast.In the time that wireless device is wearable nearly body equipment, monitor the mode of the signal of at least one broadcast by wireless devices, include but not limited to open the functions such as infrared, bluetooth, by whether thering is attachable equipment in the searching functions current environments such as infrared, bluetooth, there is attachable equipment if search in current environment, judge the signal that listens to wearable nearly body device broadcasts; If there is attachable equipment in the current environment not searching, judge the signal that does not hear wearable nearly body device broadcasts.
In one embodiment, the information content of carrying in the signal of each broadcast by wireless devices, includes but not limited to the identification information of wireless device etc.Because wireless device can be router, can be also wearable nearly body equipment, and the identification information of different wireless devices be different, therefore, the information of carrying in the signal of each broadcast by wireless devices is also different.For example, in the time that wireless device is router, the username information that the identification information carrying in wireless device is router, for example, the username information of router is 123456, the identification information carrying in the signal of router broadcast is username information 123456; In the time that wireless device is wearable nearly body equipment, the identification information carrying in wireless device is the device name of wearable nearly body equipment, for example, the device name of wearable nearly body equipment is shebei, and the identification information carrying in the signal of wearable nearly body device broadcasts is the device name shebei of wearable nearly body equipment.
In step 202, determine according to the identification information carrying in the signal of the broadcast by wireless devices receiving whether wireless device is trusted device, if so, performs step 203, if not, performs step 204.
Wherein, trusted device is the equipment higher for user's fail safe, and trusted device can be router, wearable nearly body equipment etc., and the present embodiment is not done concrete restriction to trusted device.Because each wireless device can broadcast singal, and in the signal of each broadcast by wireless devices, carrying the identification information of this wireless device, and the identification information of each wireless device is unique, therefore, in the time that whether the wireless device of determining broadcast singal is trusted device, can determine according to the identification information carrying in the signal of the broadcast by wireless devices receiving.
For example, determine that according to the identification information carrying in the signal of the broadcast by wireless devices receiving whether wireless device is trusted device, includes but not limited to:
The identification information carrying in the signal of the broadcast by wireless devices receiving is mated with the identification information of pre-stored trusted device;
If the identification information carrying in the signal of the broadcast by wireless devices receiving mates with the identification information of pre-stored trusted device, determine that wireless device is trusted device.
For said process, for the ease of understanding, will at length explain with a concrete example below.
For example, the identification information of pre-stored trusted device is a, b, c, d, and the signal that listens to broadcast by wireless devices has two, is respectively the signal 2 that signal 1 that wireless device 1 broadcasts and wireless device 2 are broadcasted.Wherein, the identification information carrying in the signal 1 that wireless device 1 is broadcasted is a, and the identification information carrying in the signal 2 that wireless device 2 is broadcasted is e.The identification information a carrying in the signal 1 of broadcasting due to the wireless device 1 receiving mates with the identification information a of pre-stored trusted device, therefore, determines that wireless device 1 is for trusted device; The identification information e carrying in the signal 2 of broadcasting due to the wireless device 2 receiving does not all mate with identification information a, b, c, the d of pre-stored trusted device, therefore, determines that wireless device 2 is for trustless equipment.
In one embodiment, because the identification information of pre-stored trusted device is the basis for estimation that the identification information carrying in the signal of the wireless device receiving is mated with the identification information of pre-stored trusted device, therefore, before being mated with the identification information of pre-stored trusted device, the identification information carrying in the signal of the broadcast by wireless devices receiving needs first to obtain the identification information of pre-stored trusted device.Wherein, the mode of the identification information of pre-stored trusted device, include but not limited to, as user, mobile terminal is carried out to safety while arranging, provide trusted device identification information interface is set, obtain the identification information that the trusted device arranging on interface is set, and by the identification information storage of the trusted device getting in the storage medium such as this locality or network.About the mode of identification information of obtaining pre-stored trusted device, include but not limited to: if the identification information storage of pre-stored trusted device is in this locality, can obtain from this locality the identification information of pre-stored trusted device, if the identification information storage of pre-stored trusted device is at network, can be from the identification information of the pre-stored trusted device of Network Capture, the present embodiment is not done concrete restriction to the mode of the identification information that obtains pre-stored trusted device.
In step 203, determine the reliability rating of wireless device, and adopt corresponding safety verification mode to verify according to the reliability rating of wireless device.
Owing to determining that according to the identification information carrying in the signal of the broadcast by wireless devices listening to wireless device is trusted device in above-mentioned steps 202, and in the time that wireless device is trusted device, the corresponding reliability rating of each wireless device, and the corresponding different safety verification mode of different reliability ratings, and the verification step of safety verification mode corresponding to every kind of reliability rating is less than the verification step of default verification mode.Therefore,, in order to determine the verification mode to terminal security checking, after definite wireless device is trusted device, need to determine the reliability rating of wireless device.
For example, determine the reliability rating of wireless device, include but not limited to:
Determine the reliability rating corresponding to identification information of wireless device according to the corresponding relation between the device identification of every kind of trusted device and reliability rating, obtain the reliability rating of wireless device.
In one embodiment, because the corresponding relation between identification information and the reliability rating of every kind of wireless device is the important evidence of the reliability rating of determining that the identification information of wireless device is corresponding, therefore, before determining according to the corresponding relation between the device identification of every kind of trusted device and reliability rating the reliability rating that the identification information of wireless device is corresponding, needing first be that each trusted device arranges different reliability ratings according to the trusting degree of each trusted device.About being the mode that each trusted device arranges different reliability ratings according to the trusting degree of each trusted device, include but not limited in the time that mobile terminal is carried out to safety verification, provide trusted device reliability rating interface is set, user arranges corresponding reliability rating the arranging on interface of reliability rating of trusted device for each trusted device according to the trusting degree of each trusted device.Safety verification device is detecting user's arranging after the setting operation on interface at the reliability rating of trusted device, obtain the arrange setting interface on done of user at the reliability rating of trusted device, and accordingly for each trusted device arranges different reliability ratings.Particularly, taking trusted device as home router, watch, bracelet, intelligent glasses, the device identification of home router is A, the device identification of watch is B, the device identification of bracelet is B, the device identification of intelligent glasses is that D is example, home router, watch, bracelet, the trusting degree of intelligent glasses is followed successively by from high to low: watch, bracelet, intelligent glasses, home router, be that each trusted device is while arranging different reliability ratings according to the trusting degree of each trusted device, reliability rating that can watch is set to 10 grades, the reliability rating of bracelet is set to 8 grades, the reliability rating of intelligent glasses is set to 7 grades, the reliability rating of home router is set to 5 grades.
In one embodiment, to continue to apply when the reliability rating of follow-up definite wireless device owing to being the different reliability ratings that arrange of each trusted device according to the trusting degree of each trusted device, therefore, the method that the present embodiment provides, being after each trusted device arranges different reliability ratings according to the trusting degree of each trusted device, also will be carried out the step of the corresponding relation between device identification and the reliability rating of storing every kind of trusted device.Particularly, storage various trusted devices device identification and reliability rating between corresponding relation time, the corresponding relation between the device identification of various trusted devices and reliability rating can be stored in corresponding storage medium.About the file layout of the corresponding relation between device identification and the reliability rating of the various trusted devices of storage, include but not limited to store with the form such as form, matrix.
Close for the correspondence representing intuitively between device identification and the reliability rating of various trusted devices of storage, below the corresponding relation between the device identification taking various trusted devices and reliability rating is stored in form as example is introduced.Specifically refer to table 1.
Table 1
Trusted device The device identification of trusted device Reliability rating
Home router A 5
Watch B 10
Bracelet C 8
Intelligent glasses D 7
In one embodiment, being after each trusted device arranges different reliability ratings according to the trusting degree of each trusted device, just can determine according to the corresponding relation between the device identification of every kind of trusted device and reliability rating the reliability rating corresponding to identification information of wireless device, and obtain the reliability rating of wireless device.
For the process of the reliability rating of above-mentioned definite wireless device, for the ease of understanding, will at length explain with a concrete example below.
Taking above-mentioned table 1 as example, if determine that according to the identification information C of the wireless device carrying in the signal of broadcast by wireless devices wireless device is bracelet, known according to the corresponding relation between device identification and the reliability rating of the wireless trusted device of storage in table 1, the reliability rating corresponding to identification information C of bracelet is 8 grades, therefore the reliability rating that, can determine bracelet is 8 grades; If determine that according to the identification information A of the wireless device carrying in the signal of broadcast by wireless devices wireless device is home router, known according to the corresponding relation between device identification and the reliability rating of the wireless trusted device of storage in table 1, the reliability rating corresponding to identification information A of home router is 5 grades, therefore the reliability rating that, can determine home router is 5 grades.
It should be noted that, owing to detecting that wireless device is wireless device trusty, illustrate that current environment is environment trusty, under current environment, user's private information can be guaranteed to a certain extent, now in order to improve user's experience effect, reduce the operation complexity to mobile terminal safety checking, can make the verification step of the safety verification mode that every kind of reliability rating is corresponding be less than the verification step of default verification mode.Wherein, default verification mode is the verification mode to mobile terminal safety checking setting in advance, and default verification mode can be password authentification, can be also figure checking, and the present embodiment is not done concrete restriction to default verification mode.Particularly, in the time that the verification step that makes the safety verification mode that every kind of reliability rating is corresponding is less than the verification step of default verification mode, can be that the verification mode that reliability rating is high arranges minimum verification step according to the reliability rating of every kind of trusted devices, for the low verification mode of reliability rating arranges maximum verification steps, but no matter be the verification mode that reliability rating is high, or the low verification mode of reliability rating, its verification step is all less than the verification step of default verification mode.For example, default verification step is 10 steps, being every kind of trusted devices when reliability rating is set, can be that the verification step of the watch of 10 grades is made as 1 step by reliability rating according to reliability rating, and the verification step that is the bracelet of 8 grades by reliability rating is made as 3 steps etc.
For the above-mentioned verification step process that makes the verification step of the safety verification mode that every kind of reliability rating is corresponding be less than default verification mode, will be introduced with a concrete application scenarios below.
For example; in order to protect the user's who stores in mobile terminal information security; conventionally can screen locking password be set to mobile terminal; when mobile terminal determines that according to the signal of the broadcast by wireless devices listening to wireless device is trusted device; and when the reliability rating of wireless device is 10 grades; if reliability rating is 10 grades when mobile terminal is carried out to safety verification; the verification mode of corresponding safety verification is without the directly sliding screen release of input unlocking pin, now can adopt the verification mode of direct sliding screen release to verify.
Above-mentioned only mobile terminal is arranged to screen locking password as example, certainly, need the scene of password authentification for other, in the time detecting that the reliability rating of wireless device is higher, also can verify without input password.
In one embodiment, adopting according to the reliability rating of wireless device after corresponding safety verification mode verifies, if the reliability rating of the wireless device setting in advance can not react the current trusting degree of this equipment, the now reliability rating of renewable wireless device, and in the time carrying out safety verification by wireless device next time, safety verification mode corresponding to reliability rating after upgrading according to wireless device verified.For example, if the reliability rating of home router is 5 grades, adopt corresponding safety verification mode to find to use recently the frequency of home router after verifying according to the reliability rating of home router higher, it is high when the degree of belief of this home router arranges than at first at present, therefore, in order to carry out safety verification according to the reliability rating of wireless device better, now need to upgrade the reliability rating of home router, and in the time carrying out safety verification by home router next time, safety verification mode corresponding to reliability rating after upgrading according to home router verified.
In step 204, adopt default verification mode to verify.
Owing to determining that according to the identification information carrying in the signal of the broadcast by wireless devices listening to wireless device is trustless equipment in above-mentioned steps 202; illustrate that current environment is the environment that trusting degree is lower; as environment such as outdoor, offices; therefore; in order to protect the user information safety of storing in terminal, now default employing verification mode is verified.Particularly, if default card mode is password authentification, now need on safety verification interface, inputs password and verify; If default verification mode is figure checking, now need on safety verification interface, draws corresponding figure and verify.
The method that disclosure embodiment provides, by monitoring the signal of the identification information that carries each wireless device of at least one broadcast by wireless devices, and determine that according to the identification information carrying in the signal of the broadcast by wireless devices receiving wireless device is after trusted device, determine the reliability rating of wireless device, and then adopt corresponding safety verification mode to verify according to the reliability rating of wireless device.Due to safety verification mode corresponding to different reliability ratings, therefore, provide one safe verification method flexibly.
Fig. 3 is according to the device schematic diagram of a kind of safety verification shown in an exemplary embodiment, and with reference to Fig. 3, this device comprises monitors module 301, the first determination module 302, the second determination module 303 and authentication module 304.
This monitoring module 301 is configured to monitor the signal of at least one broadcast by wireless devices, wherein, at least carries the identification information of each wireless device in the signal of each broadcast by wireless devices;
This first determination module 302 is configured to determine according to the identification information carrying in the signal of the broadcast by wireless devices receiving whether wireless device is trusted device;
This second determination module 303 is configured to, in the time that wireless device is trusted device, determine the reliability rating of wireless device;
This authentication module 304 is configured to adopt corresponding safety verification mode to verify according to the reliability rating of wireless device;
Wherein, the safety verification mode that different reliability rating is corresponding different, and the verification step of safety verification mode corresponding to every kind of reliability rating is less than the verification step of default verification mode.
In another embodiment, with reference to Fig. 4, the first determination module 302 comprises matching unit 3021 and determining unit 3022.
This matching unit 3021 is configured to the identification information carrying in the signal of the broadcast by wireless devices receiving to mate with the identification information of pre-stored trusted device;
This determining unit 3022 is configured to, in the time that the identification information carrying in the signal of the broadcast by wireless devices receiving mates with the identification information of pre-stored trusted device, determine that wireless device is trusted device.
In another embodiment, with reference to Fig. 5, this device also comprises module 305 and memory module 306 is set.
This arranges that module 305 is configured to according to the trusting degree of each trusted device is that each trusted device arranges different reliability ratings;
This memory module 306 is configured to store the corresponding relation between device identification and the reliability rating of every kind of trusted device;
The second determination module 303 is configured to determine according to the corresponding relation between the device identification of every kind of trusted device and reliability rating the reliability rating corresponding to identification information of wireless device, obtains the reliability rating of wireless device.
In another embodiment, authentication module 304 is configured in the time that wireless device is trustless equipment, adopts default verification mode to verify.
In another embodiment, with reference to Fig. 6, this device also comprises update module 307 and authentication module 304.
This update module 307 is configured to upgrade the reliability rating of wireless device;
This authentication module 304 is configured in the time carrying out safety verification by wireless device next time, and safety verification mode corresponding to reliability rating after upgrading according to wireless device verified.
The device that disclosure embodiment provides, by monitoring the signal of the identification information that carries each wireless device of at least one broadcast by wireless devices, and determine that according to the identification information carrying in the signal of the broadcast by wireless devices receiving wireless device is after trusted device, determine the reliability rating of wireless device, and then adopt corresponding safety verification mode to verify according to the reliability rating of wireless device.Due to safety verification mode corresponding to different reliability ratings, therefore, provide one safe verification method flexibly.
About the device in above-described embodiment, wherein the concrete mode of modules executable operations have been described in detail in the embodiment about the method, will not elaborate explanation herein.
Fig. 7 is according to a kind of block diagram for terminal 700 shown in an exemplary embodiment.For example, terminal 700 can be mobile phone, computer, digital broadcast terminal, information receiving and transmitting equipment, game console, flat-panel devices, Medical Devices, body-building equipment, personal digital assistant etc.
With reference to Fig. 7, terminal 700 can comprise following one or more assembly: processing components 702, memory 704, power supply module 706, multimedia groupware 708, audio-frequency assembly 710, the interface 712 of I/O (I/O), sensor cluster 714, and communications component 716.
The integrated operation of processing components 702 common control terminals 700, such as with demonstration, call, data communication, the operation that camera operation and record operation are associated.Treatment element 702 can comprise that one or more processors 720 carry out instruction, to complete all or part of step of above-mentioned method.In addition, processing components 702 can comprise one or more modules, is convenient to mutual between processing components 702 and other assemblies.For example, processing unit 702 can comprise multi-media module, to facilitate mutual between multimedia groupware 708 and processing components 702.
Memory 704 is configured to store various types of data to be supported in the operation of equipment 700.The example of these data comprises for any application program of operation in terminal 700 or the instruction of method, contact data, telephone book data, message, picture, video etc.Memory 704 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read-only memory (prom), read-only memory (ROM), magnetic memory, flash memory, disk or CD.
The various assemblies that electric power assembly 706 is terminal 700 provide electric power.Electric power assembly 706 can comprise power-supply management system, one or more power supplys, and other and the assembly that generates, manages and distribute electric power to be associated for terminal 700.
Multimedia groupware 708 is included in the screen that an output interface is provided between described terminal 700 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises that one or more touch sensors are with the gesture on sensing touch, slip and touch panel.Described touch sensor is the border of sensing touch or sliding action not only, but also detects duration and the pressure relevant to described touch or slide.In certain embodiments, multimedia groupware 708 comprises a front-facing camera and/or post-positioned pick-up head.When equipment 700 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 710 is configured to output and/or input audio signal.For example, audio-frequency assembly 710 comprises a microphone (MIC), and when terminal 700 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The audio signal receiving can be further stored in memory 704 or be sent via communications component 716.In certain embodiments, audio-frequency assembly 810 also comprises a loud speaker, for output audio signal.
I/O interface 712 is for providing interface between processing components 702 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor cluster 714 comprises one or more transducers, is used to terminal 700 that the state estimation of various aspects is provided.For example, sensor cluster 714 can detect the opening/closing state of equipment 700, the relative positioning of assembly, for example described assembly is display and the keypad of terminal 700, the position of all right sense terminals 700 of sensor cluster 714 or 700 1 assemblies of terminal changes, the existence that user contacts with terminal 700 or do not have the variations in temperature of terminal 700 orientation or acceleration/deceleration and terminal 700.Sensor cluster 714 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor cluster 714 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor cluster 714 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communications component 716 is configured to be convenient to the communication of wired or wireless mode between terminal 700 and other equipment.Terminal 700 can access the wireless network based on communication standard, as WiFi, and 2G or 3G, or their combination.In one exemplary embodiment, communication component 716 receives broadcast singal or the broadcast related information from external broadcasting management system via broadcast channel.In one exemplary embodiment, described communication component 716 also comprises near-field communication (NFC) module, to promote junction service.For example, can be based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, terminal 700 can be realized by one or more application specific integrated circuits (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components, for carrying out said method.
In the exemplary embodiment, also provide a kind of non-provisional computer-readable recording medium that comprises instruction, for example, comprised the memory 704 of instruction, above-mentioned instruction can have been carried out said method by the processor of terminal 700 720.For example, described non-provisional computer-readable recording medium can be ROM, random-access memory (ram), CD-ROM, tape, floppy disk and optical data storage equipment etc.
A kind of non-provisional computer-readable recording medium, in the time that the instruction in described storage medium is carried out by the processor of mobile terminal, makes mobile terminal can carry out a kind of method of safety verification, and described method comprises:
Monitor the signal of at least one broadcast by wireless devices, wherein, in the signal of each broadcast by wireless devices, at least carry the identification information of each wireless device;
Determine according to the identification information carrying in the signal of the broadcast by wireless devices receiving whether wireless device is trusted device;
If wireless device is trusted device, determines the reliability rating of wireless device, and adopt corresponding safety verification mode to verify according to the reliability rating of wireless device;
Wherein, the safety verification mode that different reliability rating is corresponding different, and the verification step of safety verification mode corresponding to every kind of reliability rating is less than the verification step of default verification mode.
The non-provisional computer-readable recording medium that disclosure embodiment provides, by monitoring the signal of the identification information that carries each wireless device of at least one broadcast by wireless devices, and determine that according to the identification information carrying in the signal of the broadcast by wireless devices receiving wireless device is after trusted device, determine the reliability rating of wireless device, and then adopt corresponding safety verification mode to verify according to the reliability rating of wireless device.Due to safety verification mode corresponding to different reliability ratings, therefore, provide one safe verification method flexibly.
Those skilled in the art, considering specification and putting into practice after invention disclosed herein, will easily expect other embodiment of the present invention.The application is intended to contain any modification of the present invention, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present invention and comprised undocumented common practise or the conventional techniques means in the art of the disclosure.Specification and embodiment are only regarded as exemplary, and true scope of the present invention and spirit are pointed out by claim below.
Should be understood that, the present invention is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various amendments and change not departing from its scope, and scope of the present invention is only limited by appended claim.

Claims (11)

1. a method for safety verification, is characterized in that, described method comprises:
Monitor the signal of at least one broadcast by wireless devices, wherein, in the signal of each broadcast by wireless devices, at least carry the identification information of each wireless device;
Determine according to the identification information carrying in the signal of the broadcast by wireless devices receiving whether described wireless device is trusted device;
If described wireless device is trusted device, determines the reliability rating of described wireless device, and adopt corresponding safety verification mode to verify according to the reliability rating of described wireless device;
Wherein, the safety verification mode that different reliability rating is corresponding different, and the verification step of safety verification mode corresponding to every kind of reliability rating is less than the verification step of default verification mode.
2. method according to claim 1, is characterized in that, the identification information carrying in the signal of the broadcast by wireless devices that described basis receives determines that whether described wireless device is trusted device, comprising:
The identification information carrying in the signal of the broadcast by wireless devices receiving is mated with the identification information of pre-stored trusted device;
If the identification information carrying in the signal of the broadcast by wireless devices receiving mates with the identification information of pre-stored trusted device, determine that described wireless device is trusted device.
3. method according to claim 1, is characterized in that, before the described reliability rating of determining described wireless device, also comprises:
Be that each trusted device arranges different reliability ratings according to the trusting degree of each trusted device, and store the corresponding relation between device identification and the reliability rating of every kind of trusted device;
The described reliability rating of determining described wireless device, comprising:
Determine the reliability rating corresponding to identification information of described wireless device according to the corresponding relation between the device identification of every kind of trusted device and reliability rating, obtain the reliability rating of described wireless device.
4. method according to claim 1, is characterized in that, the identification information carrying in the signal of the broadcast by wireless devices that described basis receives determines that whether described wireless device is after trusted device, also comprises:
If described wireless device is trustless equipment, adopt default verification mode to verify.
5. method according to claim 1, is characterized in that, the described reliability rating according to described wireless device adopts after corresponding safety verification mode verifies, also comprises:
Upgrade the reliability rating of described wireless device, and in the time carrying out safety verification by described wireless device next time, safety verification mode corresponding to reliability rating after upgrading according to described wireless device verified.
6. a device for safety verification, is characterized in that, described device comprises:
Monitor module, for monitoring the signal of at least one broadcast by wireless devices, wherein, in the signal of each broadcast by wireless devices, at least carry the identification information of each wireless device;
The first determination module, determines for the identification information carrying according to the signal of the broadcast by wireless devices receiving whether described wireless device is trusted device;
The second determination module, in the time that described wireless device is trusted device, determines the reliability rating of described wireless device;
Authentication module, for adopting corresponding safety verification mode to verify according to the reliability rating of described wireless device;
Wherein, the safety verification mode that different reliability rating is corresponding different, and the verification step of safety verification mode corresponding to every kind of reliability rating is less than the verification step of default verification mode.
7. device according to claim 6, is characterized in that, described the first determination module, comprising:
Matching unit, mates with the identification information of pre-stored trusted device for identification information that the signal of the broadcast by wireless devices receiving is carried;
Determining unit, when the identification information carrying mates with the identification information of pre-stored trusted device, determines that described wireless device is trusted device for the signal when the broadcast by wireless devices receiving.
8. device according to claim 6, is characterized in that, described device, also comprises:
Module is set, for being that each trusted device arranges different reliability ratings according to the trusting degree of each trusted device;
Memory module, for storing the corresponding relation between device identification and the reliability rating of every kind of trusted device;
Described the second determination module, for determine the reliability rating corresponding to identification information of described wireless device according to the corresponding relation between the device identification of every kind of trusted device and reliability rating, obtains the reliability rating of described wireless device.
9. device according to claim 6, is characterized in that, described authentication module, also in the time that described wireless device is trustless equipment, adopts default verification mode to verify.
10. device according to claim 6, is characterized in that, described device, also comprises:
Update module, for upgrading the reliability rating of described wireless device;
Described authentication module, also in the time carrying out safety verification by described wireless device next time, safety verification mode corresponding to reliability rating after upgrading according to described wireless device verified.
11. 1 kinds of mobile terminals, it is characterized in that, described mobile terminal includes memory, and one or more than one program, one of them or more than one program are stored in memory, and be configured to be carried out by more than one or one processor, described more than one or one program package contains for carrying out the instruction of following operation:
Monitor the signal of at least one broadcast by wireless devices, wherein, in the signal of each broadcast by wireless devices, at least carry the identification information of each wireless device;
Determine according to the identification information carrying in the signal of the broadcast by wireless devices receiving whether described wireless device is trusted device;
If described wireless device is trusted device, determines the reliability rating of described wireless device, and adopt corresponding safety verification mode to verify according to the reliability rating of described wireless device;
Wherein, the safety verification mode that different reliability rating is corresponding different, and the verification step of safety verification mode corresponding to every kind of reliability rating is less than the verification step of default verification mode.
CN201410156336.7A 2014-04-17 2014-04-17 The method of safety verification, device and mobile terminal Active CN103957103B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410156336.7A CN103957103B (en) 2014-04-17 2014-04-17 The method of safety verification, device and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410156336.7A CN103957103B (en) 2014-04-17 2014-04-17 The method of safety verification, device and mobile terminal

Publications (2)

Publication Number Publication Date
CN103957103A true CN103957103A (en) 2014-07-30
CN103957103B CN103957103B (en) 2017-07-04

Family

ID=51334333

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410156336.7A Active CN103957103B (en) 2014-04-17 2014-04-17 The method of safety verification, device and mobile terminal

Country Status (1)

Country Link
CN (1) CN103957103B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104933351A (en) * 2015-05-26 2015-09-23 小米科技有限责任公司 Information security processing method and information security processing device
CN105119883A (en) * 2015-07-08 2015-12-02 广东欧珀移动通信有限公司 Verify method based on vibration signals and server
CN105182784A (en) * 2015-09-24 2015-12-23 小米科技有限责任公司 Method and device of controlling intelligent devices and terminal
CN105681328A (en) * 2016-02-26 2016-06-15 安徽华米信息科技有限公司 Electronic device controlling method and device as well as electronic device
WO2016138827A1 (en) * 2015-03-02 2016-09-09 阿里巴巴集团控股有限公司 Data transmission method and system
CN106293308A (en) * 2015-05-21 2017-01-04 腾讯科技(深圳)有限公司 A kind of unlocking screen method and device
CN106304072A (en) * 2016-08-26 2017-01-04 北京小米移动软件有限公司 Safe verification method and device
CN106412909A (en) * 2016-10-19 2017-02-15 广东欧珀移动通信有限公司 Device connection method and device
CN106535187A (en) * 2016-10-27 2017-03-22 上海斐讯数据通信技术有限公司 Smart home equipment access method and system based on wireless router terminal
CN107077598A (en) * 2014-09-12 2017-08-18 微软技术许可有限责任公司 Video with secret protection is caught
WO2018137239A1 (en) * 2017-01-26 2018-08-02 华为技术有限公司 Authentication method, authentication server, and core network equipment
CN110097749A (en) * 2019-05-09 2019-08-06 北京助创科技有限公司 Update method, control terminal and the monitoring system of monitoring device configuration data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020147920A1 (en) * 2001-04-05 2002-10-10 Anthony Mauro Method and apparatus for providing secure processing and data storage for a wireless communication device
CN101001144A (en) * 2006-01-13 2007-07-18 华为技术有限公司 Method for implementing authentication by entity authentication centre
CN103428695A (en) * 2012-05-18 2013-12-04 飞天联合(北京)信息技术有限公司 Method and device for processing wireless multiple-security-level services
CN103685244A (en) * 2013-11-28 2014-03-26 深圳大学 Differentiated authentication method and differentiated authentication device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020147920A1 (en) * 2001-04-05 2002-10-10 Anthony Mauro Method and apparatus for providing secure processing and data storage for a wireless communication device
CN101001144A (en) * 2006-01-13 2007-07-18 华为技术有限公司 Method for implementing authentication by entity authentication centre
CN103428695A (en) * 2012-05-18 2013-12-04 飞天联合(北京)信息技术有限公司 Method and device for processing wireless multiple-security-level services
CN103685244A (en) * 2013-11-28 2014-03-26 深圳大学 Differentiated authentication method and differentiated authentication device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张婷: "智能终端接入校园WLAN认证方法研究", 《计算机科学》 *
王少波 等: "WLAN认证方案研究", 《数据通信》 *

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107077598A (en) * 2014-09-12 2017-08-18 微软技术许可有限责任公司 Video with secret protection is caught
US10602054B2 (en) 2014-09-12 2020-03-24 Microsoft Technology Licensing, Llc Video capture with privacy safeguard
CN107077598B (en) * 2014-09-12 2020-10-27 微软技术许可有限责任公司 Video capture with privacy protection
WO2016138827A1 (en) * 2015-03-02 2016-09-09 阿里巴巴集团控股有限公司 Data transmission method and system
CN106293308A (en) * 2015-05-21 2017-01-04 腾讯科技(深圳)有限公司 A kind of unlocking screen method and device
CN106293308B (en) * 2015-05-21 2020-06-02 腾讯科技(深圳)有限公司 Screen unlocking method and device
CN104933351B (en) * 2015-05-26 2018-10-26 小米科技有限责任公司 The treating method and apparatus of information security
CN104933351A (en) * 2015-05-26 2015-09-23 小米科技有限责任公司 Information security processing method and information security processing device
CN105119883A (en) * 2015-07-08 2015-12-02 广东欧珀移动通信有限公司 Verify method based on vibration signals and server
CN105119883B (en) * 2015-07-08 2019-04-12 Oppo广东移动通信有限公司 A kind of verification method and server based on vibration signal
CN105182784A (en) * 2015-09-24 2015-12-23 小米科技有限责任公司 Method and device of controlling intelligent devices and terminal
CN105681328B (en) * 2016-02-26 2019-04-09 安徽华米信息科技有限公司 The method, apparatus and electronic equipment of controlling electronic devices
CN105681328A (en) * 2016-02-26 2016-06-15 安徽华米信息科技有限公司 Electronic device controlling method and device as well as electronic device
CN106304072A (en) * 2016-08-26 2017-01-04 北京小米移动软件有限公司 Safe verification method and device
CN106412909B (en) * 2016-10-19 2019-09-27 广东欧珀移动通信有限公司 A kind of method and device of equipment connection
CN106412909A (en) * 2016-10-19 2017-02-15 广东欧珀移动通信有限公司 Device connection method and device
CN106535187A (en) * 2016-10-27 2017-03-22 上海斐讯数据通信技术有限公司 Smart home equipment access method and system based on wireless router terminal
WO2018137239A1 (en) * 2017-01-26 2018-08-02 华为技术有限公司 Authentication method, authentication server, and core network equipment
CN110097749A (en) * 2019-05-09 2019-08-06 北京助创科技有限公司 Update method, control terminal and the monitoring system of monitoring device configuration data

Also Published As

Publication number Publication date
CN103957103B (en) 2017-07-04

Similar Documents

Publication Publication Date Title
CN103957103A (en) Safety authentication method and device and mobile terminal
CN104038263A (en) Method and device for establishing Bluetooth connection
CN104159218B (en) Internetwork connection establishing method and device
CN104105169B (en) From method and the device of the WLAN (wireless local area network) that is dynamically connected
CN104219038A (en) Method and device for synchronizing data
CN105472303A (en) Privacy protection method and apparatus for video chatting
CN104378501A (en) Phone number naming method and device
CN104484200A (en) Method and device for updating firmware
CN104915123A (en) Terminal display method and device
CN105160320A (en) Fingerprint identification method and apparatus, and mobile terminal
CN104468581B (en) The method and device of login application program
CN104185304A (en) Method and device for accessing WI-FI network
CN103986999A (en) Method, device and terminal equipment for detecting earphone impedance
CN104536891A (en) Method and device for testing system
CN103944963A (en) Data synchronization method, device and system and equipment
CN105228141A (en) A kind of methods, devices and systems set up network and connect
CN105100074A (en) Data operation processing method, device and terminal equipment
CN105472771A (en) Wireless connection method and device
CN104780045A (en) Management method and management device for intelligent devices
CN105338399A (en) Image acquisition method and device
CN104735670A (en) Network access method and device
CN105068848A (en) System upgrading method and apparatus
CN104640062A (en) Method and device for transmitting information
CN104837133A (en) SIM card authentication method and device
CN105530129A (en) Router reset method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant