CN104581727A - Equipment connecting method and device and AP (access point) end electronic equipment - Google Patents

Equipment connecting method and device and AP (access point) end electronic equipment Download PDF

Info

Publication number
CN104581727A
CN104581727A CN201510053964.7A CN201510053964A CN104581727A CN 104581727 A CN104581727 A CN 104581727A CN 201510053964 A CN201510053964 A CN 201510053964A CN 104581727 A CN104581727 A CN 104581727A
Authority
CN
China
Prior art keywords
access device
identification
equipment
access
databases
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510053964.7A
Other languages
Chinese (zh)
Inventor
林涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fuzhou Rockchip Electronics Co Ltd
Original Assignee
Fuzhou Rockchip Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fuzhou Rockchip Electronics Co Ltd filed Critical Fuzhou Rockchip Electronics Co Ltd
Priority to CN201510053964.7A priority Critical patent/CN104581727A/en
Publication of CN104581727A publication Critical patent/CN104581727A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides an equipment connecting method and device and AP (access point) end electronic equipment. The equipment connecting method includes acquiring an access request sent from an access device, to be specific, the access request contains contact identification code of the access device; according to the contact identification code of the access device, performing authentification on a contact information database and determining whether or not the access device is legal; accessing the legal access device to the current wireless network. According to the arrangement, the access device user identifier is authenticated, and whether or not the access device is allowed to access to the current wireless network is judged, in this way, password of the current wireless network is omitted, and Soft AP network connection is simplified in steps and improved in safety.

Description

Equipment connection method, device and AP hold electronic equipment
Technical field
The present invention relates to computer communication technology, particularly relate to a kind of equipment connection method, device and AP and hold electronic equipment.
Background technology
Along with the development of mobile device, WIFI (Wireless Fidelity, Wireless Fidelity) technology as a kind of wireless Internet access technology more and more use by user, equipment is connected to wireless network by wireless aps (Access Point, access points).SoftAP is a kind of by wireless network card, uses special-purpose software to realize the technology of the functions such as the same signal converting of AP, route on an electronic device.Namely electronic equipment carries as software router after special-purpose software, and other equipment realize wireless network connect by connecting this electronic equipment.
In prior art, as the electronic equipment of software router for preventing illegal access, one can be arranged and connect password, during this electronic equipment of other equipment connections, correct connection password need be inputted to complete authentication.Now, other equipment need know this connection password in advance, and manually could realize after input connecting, operating procedure is more complicated, and password is easily revealed.
Summary of the invention
For this reason, the embodiment of the present invention provides a kind of equipment connection method, device and AP to hold electronic equipment, in order to simplify the operating procedure that in SoftAP, network connects, and improves the fail safe of network connection.
The embodiment of the present invention adopts following technical scheme:
First aspect, a kind of equipment connection method is provided, the AP be applied to as software router holds electronic equipment, and described AP end electronic equipment is preset and comprised the described AP end identification of contacts code of electronic equipment and the databases of contact information of corresponding access rights, and described equipment connection method comprises:
Obtain the access request that access device sends, in described access request, comprise the identification of contacts code of described access device;
Identification of contacts code according to described access device carries out authentication in described databases of contact information, determines whether described access device belongs to legitimate device;
The described access device access active wireless network of legitimate device will be belonged to.
In the first possible implementation of first aspect, the identification of contacts code stored in described databases of contact information is the telephone number of described contact person, and the identification of contacts code of described access device is the my phone numbers of described access device.
In the implementation that first aspect the second is possible, also comprise the equipment identification information of described access device in described access request, described method also comprises:
Described equipment identification information is stored in described databases of contact information.
In the third possible implementation of first aspect, the described identification of contacts code according to described access device carries out authentication in described databases of contact information, determines whether described access device belongs to legitimate device, comprising:
Determine whether the identification of contacts code of described access device mates with the identification of contacts code stored in described databases of contact information;
If the match is successful for the identification of contacts code stored in the identification of contacts code of described access device and described databases of contact information, then determine whether to allow described identification of contacts code to access described active wireless network;
If allow described identification of contacts code to access described active wireless network, then determine whether the equipment identification information of described access device mates with the equipment identification information stored in described databases of contact information;
If the match is successful for the equipment identification information stored in the equipment identification information of described access device and described databases of contact information, then determine that described access device belongs to legitimate device.
In first aspect the 4th kind of possible implementation, the contacts list application that can show the identification of contacts code stored in described databases of contact information preset by described AP end electronic equipment, and described method also comprises:
In described contacts list application, highlight the identification of contacts code of the described access device being connected to described active wireless network.
In first aspect the 5th kind of possible implementation, described method also comprises:
Obtain and disconnect the disconnection request that described access device is connected to active wireless network;
Disconnect according to described the equipment identification information that described access device is determined in request, disconnect the connection of described access device and described active wireless network.
In first aspect the 6th kind of possible implementation, described method also comprises:
Search described databases of contact information according to described equipment identification information, determine the described identification of contacts code of described access device;
In described contacts list application, cancel the identification of contacts code highlighting the described access device disconnecting described active wireless network.
Second aspect, provides a kind of equipment connecting device, and the AP be applied to as software router holds electronic equipment, and described equipment connecting device comprises databases of contact information, acquisition module, authentication module and network connecting module:
Described databases of contact information, comprises described AP and holds the identification of contacts code of electronic equipment and corresponding access rights;
Described acquisition module, for obtaining the access request that access device sends, comprising the identification of contacts code of described access device, described access request is sent to described authentication module in described access request;
Described authentication module, carries out authentication for the identification of contacts code according to described access device in described databases of contact information, determines whether described access device belongs to legitimate device, and notifies described network connecting module;
Described network connecting module, for the notice according to described authentication module, will be defined as the described access device access active wireless network of legitimate device.
In the first possible implementation of second aspect, the identification of contacts code stored in described databases of contact information is the telephone number of described contact person, and the identification of contacts code of described access device is the my phone numbers of described access device.
In the implementation that second aspect the second is possible, also comprise the equipment identification information of described access device in described access request, described equipment connecting device also comprises:
Memory module, stores for being sent in described databases of contact information by described equipment identification information.
In the third possible implementation of second aspect, described authentication module also for:
Determine whether the identification of contacts code of described access device mates with the identification of contacts code stored in described databases of contact information;
If the match is successful for the identification of contacts code stored in the identification of contacts code of described access device and described databases of contact information, then determine whether to allow described identification of contacts code to access described active wireless network;
If allow described identification of contacts code to access described active wireless network, then determine whether the equipment identification information of described access device mates with the equipment identification information stored in described databases of contact information;
If the match is successful for the equipment identification information stored in the equipment identification information of described access device and described databases of contact information, then determine that described access device belongs to legitimate device.
In second aspect the 4th kind of possible implementation, the contacts list application that can show the identification of contacts code stored in described databases of contact information preset by described AP end electronic equipment, and described equipment connecting device also comprises:
Mutual display module, in described contacts list application, highlights the identification of contacts code of the described access device being connected to described active wireless network.
In second aspect the 5th kind of possible implementation, described acquisition module also disconnects for obtaining the disconnection request that described access device is connected to active wireless network;
Described network connecting module also for disconnecting according to described the equipment identification information that described access device is determined in request, disconnects the connection of described access device and described active wireless network.
In second aspect the 6th kind of possible implementation, described device also comprises:
Searching module, for searching described databases of contact information according to described equipment identification information, determining the described identification of contacts code of described access device;
Described mutual display module also in described contacts list application, cancels the identification of contacts code highlighting the described access device disconnecting described active wireless network.
The third aspect, provides a kind of AP to hold electronic equipment, comprising:
Touch-sensitive display, comprises human-computer interaction interface;
Processor;
And for storing the memory of described processor executable, described memory is preset and is comprised the described AP end identification of contacts code of electronic equipment and the databases of contact information of corresponding access rights;
Wherein, described processor is configured to:
Obtain the access request that access device sends, in described access request, comprise the identification of contacts code of described access device;
Identification of contacts code according to described access device carries out authentication in described databases of contact information, determines whether described access device belongs to legitimate device;
The described access device access active wireless network of legitimate device will be belonged to.
In the technical scheme of the present embodiment, the access request carrying identification of contacts code that the equipment connecting device that AP holds electronic equipment to carry sends by obtaining access device, information matches is carried out in the databases of contact information preset, if the identification of contacts code of access device and access rights identical with a certain identification of contacts code prestored in information database access for allowing, the contact person of the permission access that the use user of this access device holds electronic equipment to arrange for this AP is then described, then determine that this access device is that legitimate device allows its access active wireless network.By the mode of the authenticating identity to access equipment use user, judge whether to allow this access device to access active wireless network, without the need to informing the password of access device access active wireless network, simplify the network connection procedure of SoftAP, and improve the fail safe of SoftAP networking connection.
Accompanying drawing explanation
Fig. 1 is present device method of attachment first embodiment flow chart;
Figure 1A is that in the first embodiment, AP holds the databases of contact information structural representation that electronic equipment is preset;
Fig. 2 is present device method of attachment second embodiment flow chart;
Fig. 3 is present device method of attachment the 3rd embodiment flow chart;
Fig. 4 is present device jockey first example structure schematic diagram;
Fig. 5 is present device jockey second example structure schematic diagram.
Embodiment
By describe in detail technical scheme technology contents, structural feature, realized object and effect, coordinate accompanying drawing to be explained in detail below in conjunction with specific embodiment.
Fig. 1 is present device method of attachment first embodiment flow chart, as shown in Figure 1, the equipment connection method that the embodiment of the present invention provides holds the equipment connecting device carried in electronic equipment to perform by the AP in SoftAP technology, and wherein AP holds the equipment connecting device carried in electronic equipment can adopt the form of software and/or hardware to realize.
AP end electronic equipment refers to that electronic equipment is converted into software router by the equipment connecting device carried, and wide area network wireless network operator provided is converted to local area network wireless network.Access device refers to the terminal supporting WIFI network communication protocol, and multiple access device holds electronic equipment by connecting an AP, realizes the access to active wireless network.AP holds electronic equipment and access device to be the electronic equipment can supporting wlan network communication protocol, such as notebook computer, smart mobile phone, personal digital assistant etc.
The equipment connection method that the present embodiment provides comprises:
Step 100, obtains the access request that access device sends, comprises the identification of contacts code of described access device in described access request;
First, AP holds electronic equipment to preset a databases of contact information, the identification of contacts code of contact person and the access rights of correspondence that this AP holds electronic equipment are comprised in this databases of contact information, such as AP holds the contact person of electronic equipment to comprise A, B, C, then comprise the access rights of identification of contacts code PA and A of A in its contact information, the access rights of identification of contacts code PB and B of B, and the access rights of identification of contacts code PC and C of C, identification of contacts code is used for the identity information of identifying user, it can be the telephone number of contact person, the user ID of instant messaging application software, the application ID etc. of sociability application software.
Preferably, the identification of contacts code stored in contact information is the telephone number that AP holds the contact person of electronic equipment.
SoftAP function during AP holds electronic equipment unlatching WIFI to arrange, access device opens WIFI hot spot function, by web search, can find AP and hold electronic equipment as the APN of current accessible AP focus.
The equipment connecting device that access device sends access active wireless network access request by WIFI communication protocol holds electronic equipment to carry to AP, wherein active wireless network refers to the local area network wireless network obtained after AP holds electronic equipment to change as the wide area network wireless network that operator provides by software router.The identification of contacts code of this access device is carried in this access request, wherein this identification of contacts code is identical with the identification of contacts code attribute stored in databases of contact information, refer to and can identify the identification information that this access device uses user identity, the such as user ID of my phone numbers, the machine instant messaging application software, the application ID etc. of the machine sociability application software.
Preferably, the identification of contacts code of access device is the my phone numbers of access device.
After the equipment connecting device that AP end electronic equipment carries receives the access request of access device transmission, resolve this access request according to WIFI standard communication protocol, obtain the identification of contacts code of this access device entrained in this access request.
Step 102, the identification of contacts code according to described access device carries out authentication in described databases of contact information, determines whether described access device belongs to legitimate device;
According to the identification of contacts code of this access device carried in access request, traversal databases of contact information, mate with the identification of contacts code stored in databases of contact information, determine whether the use user of this access device is the contact person that AP holds electronic equipment, and the access rights of correspondence.
If the identification of contacts code stored in the identification of contacts code of this access device and databases of contact information matches, one of contact person that the use user of this access device is AP end electronic equipment is then described, if the access rights of the contact person of this access device are for allowing access further, then determine that this access device belongs to legitimate device, allow the active wireless network that this access device access AP holds electronic equipment to provide.
Further, if the identification of contacts code of this access device does not mate with the identification of contacts code stored in databases of contact information or though the match is successful but the access rights of this contact person access for not allowing, then illustrate the use user of this access device be not AP hold electronic equipment contact person maybe this use user be disabled user, then determine that this access device belongs to illegality equipment, refuse the active wireless network that this access device access AP holds electronic equipment to provide.
Step 104, will be defined as the described access device access active wireless network of legitimate device.
Illustrate as follows further:
Figure 1A is that in the first embodiment, AP holds the databases of contact information structural representation that electronic equipment is preset, as shown in Figure 1A, the information of databases of contact information difference storing contact A, B, C tri-contact persons, wherein the information of contact person A comprises: the telephone number PA of contact person user name A, permission access active wireless network, contact person A; The information of contact person B comprises: contact person user name B, do not allow access active wireless network, contact person B telephone number PB; The telephone number PC of contact person user name C, permission access active wireless network, contact person C.
1, successful example is accessed
(1) user A is used to use the UART controller of the machine to communicate with Modem baseband chip by the wireless encryption authentication module of access device, Modem baseband chip utilizes the information of standard communication protocol order reading SIM card from SIM card such as AT order, obtains my phone numbers (namely using the telephone number of user A) and sends to coded communication module.
(2) the coded communication CMOS macro cell of access device portably uses the access request of the telephone number of user A, is sent to AP and holds electronic equipment.
(3) AP holds the equipment connecting device that electronic equipment carries to obtain this access request, and resolves the telephone number obtaining using user A.
(4) according to the telephone number query databases of contact information using user A, Query Result is contact person A is that AP holds one of contact person of electronic equipment, and access rights are for allowing access.Then determine to use this access device used of user A to be legitimate device.
(5) AP holds electronic equipment that access device is accessed active wireless network.
2, access failure example
(1) user B is used to use the UART controller of the machine to communicate with Modem baseband chip by the wireless encryption authentication module of access device, Modem baseband chip utilizes the information of standard communication protocol order reading SIM card from SIM card such as AT order, obtains my phone numbers (namely using the telephone number of user B) and sends to coded communication module.
(2) the coded communication CMOS macro cell of access device portably uses the access request of the telephone number of user B, is sent to AP and holds electronic equipment.
(3) AP holds the equipment connecting device that electronic equipment carries to obtain this access request, and resolves the telephone number obtaining using user B.
(4) according to the telephone number query databases of contact information using user B, Query Result is contact person B is that AP holds one of contact person of electronic equipment, and access rights are not for allowing access.Then determine to use this access device used of user B to be illegality equipment.
(5) AP holds electronic equipment refusal access device access active wireless network.
3, access failure example
(1) user D is used to use the UART controller of the machine to communicate with Modem baseband chip by the wireless encryption authentication module of access device, Modem baseband chip utilizes the information of standard communication protocol order reading SIM card from SIM card such as AT order, obtains my phone numbers (namely using the telephone number of user D) and sends to coded communication module.
(2) the coded communication CMOS macro cell of access device portably uses the access request of the telephone number of user D, is sent to AP and holds electronic equipment.
(3) AP holds the equipment connecting device that electronic equipment carries to obtain this access request, and resolves the telephone number obtaining using user D.
(4) according to the telephone number query databases of contact information using user D, Query Result is contact person D is not that AP holds one of contact person of electronic equipment, then determine to use this access device used of user D to be illegality equipment.
(5) AP holds electronic equipment refusal access device access active wireless network.
In the technical scheme of the present embodiment, the access request carrying identification of contacts code that the equipment connecting device that AP holds electronic equipment to carry sends by obtaining access device, information matches is carried out in the databases of contact information preset, if the identification of contacts code of access device and access rights identical with a certain identification of contacts code prestored in information database access for allowing, the contact person of the permission access that the use user of this access device holds electronic equipment to arrange for this AP is then described, then determine that this access device is that legitimate device allows its access active wireless network.By the mode of the authenticating identity to access equipment use user, judge whether to allow this access device to access active wireless network, without the need to informing the password of access device access active wireless network, simplify the network connection procedure of SoftAP, and improve the fail safe of SoftAP networking connection.
Fig. 2 is present device method of attachment second embodiment flow chart, and as shown in Figure 2, the executive agent of this embodiment is equipment connecting device, and the method comprises:
Step S200, obtains the access request that access device sends, comprises identification of contacts code and the equipment identification information of described access device in described access request;
Step S202, determines whether the identification of contacts code of described access device mates with the identification of contacts code stored in described databases of contact information, if coupling, enters step S204;
Step S204, determines whether to allow described identification of contacts code to access described active wireless network; If then enter step S206;
Step S206, determines whether the identification of contacts code of described access device has stored corresponding equipment identification information in described databases of contact information, if do not store, enters step S208, enters step S210 if stored;
Step S208, the identification of contacts code that the equipment identification information of described access device is corresponding with described databases of contact information carries out association store, determines that described access device is legitimate device, enters step S212;
Step S210, determines whether the equipment identification information of described access device mates with the equipment identification information stored in described databases of contact information, if coupling, determines that described access device is legitimate device, enters step S212;
Step S212, will be defined as the described access device access active wireless network of legitimate device.
Particularly, AP holds in electronic equipment and presets a databases of contact information, comprise this AP in this databases of contact information and hold the identification of contacts code of the contact person of electronic equipment and corresponding access rights, identification of contacts code can use the application ID etc. of the telephone number of contact person or the user ID of instant messaging application software or sociability application software.Preferably, the identification of contacts code stored in contact information is the telephone number that AP holds the contact person of electronic equipment.AP holds the SoftAP function in electronic equipment unlatching WIFI function, arranges APN and connects for access device search.
After access device opens WIFI hot spot, after search obtains the APN of the AP focus of AP end electronic equipment, send access request and hold electronic equipment to AP, wherein access request carries identification of contacts code and the equipment identification information of access device.
The identification of contacts code of access device refers to and can identify the identification information that this access device uses user identity, the such as user ID of my phone numbers, the machine instant messaging application software, the application ID etc. of the machine sociability application software.Preferably, the identification of contacts code of access device is the my phone numbers of access device.
The equipment identification information of access device refers to can the facility information of this access device of unique identification, such as media access control address (Media Access Control, MAC Address).
After AP holds the equipment connecting device of electronic equipment lift-launch to get the access request of access device transmission, resolve the identification of contacts code obtaining and carry in access request, mate with databases of contact information, determine whether the use user of this access device is the contact person that AP holds electronic equipment, and determine the access rights of its correspondence.
If mate unsuccessful, illustrate that the use user of access device is not the contact person that AP holds electronic equipment, refuse the access of this access device.
If the match is successful and access rights are allow access, illustrate that the use user of access device is that AP holds electronic equipment to allow the contact person of access, search the identification of contacts code that identification of contacts code that is that store in databases of contact information and access device matches, whether there is corresponding equipment identification information.If there is corresponding equipment identification information, the wireless network that the use user of this access device once successfully accessed this AP and holds electronic equipment to provide is described, if there is not corresponding equipment identification information, illustrates that the use user of this access device is active wireless network first time accessing this AP and hold electronic equipment to provide.
If the use user of this access device accesses this AP first time to hold the active wireless network that provides of electronic equipment, then identification of contacts code corresponding with databases of contact information for the equipment identification information of access device is carried out association store, and judge that this access device is as legitimate device, allow its access active wireless network.
If the use user of this access device once accessed the wireless network that this AP holds electronic equipment to provide, then judge that whether this access device used of this use user is identical with the access device used when once accessing further, namely determine whether the equipment identification information of access device mates with the corresponding equipment identification information stored in databases of contact information.If the match is successful, illustrate that this access device used of this use user is identical with the access device used when once accessing, determine that this access device is legitimate device, and access active wireless network.
Further, if the equipment identification information of this access device does not mate with the corresponding equipment identification information stored in databases of contact information, then illustrate that this access device used of this use user is different from the access device used when once accessing, prompting AP holds the leading subscriber of electronic equipment, this access device whether is allowed to access, if allow, determine that this access device is legitimate device access active wireless network, if do not allow, determine that this access device is that illegality equipment is refused to access active wireless network.
Those skilled in the art it should be understood that the sequential of the method step that above-described embodiment provides can carry out accommodation according to actual conditions, also can carry out according to actual conditions are concurrent.
In the technical scheme of the present embodiment, the access request carrying identification of contacts code that the equipment connecting device that AP holds electronic equipment to carry sends by obtaining access device, information matches is carried out in the databases of contact information preset, if the identification of contacts code of access device, equipment identification information and a certain identification of contacts code prestored in information database and equipment identification information all identical, one of contact person that the use user of this access device is this AP end electronic equipment is then described, and its access device used is identical with equipment when once accessing, then determine that this access device is that legitimate device allows its access active wireless network.By carrying out the mode of two aspect authentications to access equipment use user identity and facility information, judge whether to allow this access device to access active wireless network, without the need to informing the password of access device access active wireless network, simplify the network connection procedure of SoftAP, and improve the fail safe of SoftAP networking connection.
Further, AP holds electronic equipment to install a contacts list that can show the identification of contacts code stored in databases of contact information in advance and applies, such as contact application software, instant messaging application software, social application software etc.
After the access device being defined as legitimate device is accessed active wireless network, in contact application list application, highlight the identification of contacts code of the described access device being connected to described active wireless network.
Such as, in contact application software, highlighted display is connected to the my phone numbers of the access device of active wireless network.
For another example, in instant communications applications software, highlighted display is connected to the user ID of the use user of the access device of active wireless network.
By highlighting the identification of contacts code of access device in contacts list application, prompting AP holds the access device of the leading subscriber of electronic equipment access active wireless network which has, and holds the leading subscriber of electronic equipment to carry out network management to facilitate AP.
Fig. 3 is present device method of attachment the 3rd embodiment flow chart, and as shown in Figure 3, the executive agent of this embodiment is equipment connecting device, and the method comprises:
Step S300, obtains the access request that access device sends, comprises identification of contacts code and the equipment identification information of described access device in described access request;
Step S302, determines whether the identification of contacts code of described access device mates with the identification of contacts code stored in described databases of contact information, if coupling, enters step S304;
Step S304, determines whether to allow described identification of contacts code to access described active wireless network; If then enter step S306;
Step S306, determines whether the identification of contacts code of described access device has stored corresponding equipment identification information in described databases of contact information, if do not store, enters step S308, enters step S310 if stored;
Step S308, the identification of contacts code that the equipment identification information of described access device is corresponding with described databases of contact information carries out association store, determines that described access device is legitimate device, enters step S312;
Step S310, determines whether the equipment identification information of described access device mates with the equipment identification information stored in described databases of contact information, if coupling, determines that described access device is legitimate device, enters step S312;
Step S312, will be defined as the described access device access active wireless network of legitimate device;
Above step S300 to step S312 is identical with method step corresponding in above-described embodiment, does not repeat them here.
Step S314, obtains and disconnects the disconnection request that described access device is connected to active wireless network;
Step S316, disconnects according to described the equipment identification information that described access device is determined in request, disconnects the connection of described access device and described active wireless network.
Particularly, the request of disconnection refers to the request disconnecting access device and be connected with active wireless network, and it breaks request and can be initiated by access device, also the leading subscriber of electronic equipment can be held to initiate by AP.When disconnecting request and being initiated by access device, disconnect the equipment identification information carrying access device in request; When disconnecting request and holding the leading subscriber of electronic equipment to initiate by AP, according to the identification of contacts code that leading subscriber is selected, search this equipment identification information corresponding to identification of contacts code.
Further, the equipment connection method of the present embodiment also comprises:
Search described databases of contact information according to described equipment identification information, determine the described identification of contacts code of described access device;
In described contacts list application, cancel the identification of contacts code highlighting the described access device disconnecting described active wireless network.
Those skilled in the art it should be understood that the sequential of the method step that above-described embodiment provides can carry out accommodation according to actual conditions, also can carry out according to actual conditions are concurrent.
In the technical scheme of the present embodiment, the access request carrying identification of contacts code that the equipment connecting device that AP holds electronic equipment to carry sends by obtaining access device, information matches is carried out in the databases of contact information preset, if the identification of contacts code of access device, equipment identification information and a certain identification of contacts code prestored in information database and equipment identification information all identical, one of contact person that the use user of this access device is this AP end electronic equipment is then described, and its access device used is identical with equipment when once accessing, then determine that this access device is that legitimate device allows its access active wireless network.By carrying out the mode of two aspect authentications to access equipment use user identity and facility information, judge whether to allow this access device to access active wireless network, without the need to informing the password of access device access active wireless network, simplify the network connection procedure of SoftAP, and improve the fail safe of SoftAP networking connection.By disconnecting management, access device and AP is facilitated to hold access and the disconnection of electronic equipment unrestricted choice network.
Fig. 4 is present device jockey first example structure schematic diagram, and as shown in Figure 4, this device comprises databases of contact information 10, acquisition module 12, authentication module 14 and network connecting module 16, wherein:
Databases of contact information 10, comprises AP and holds the identification of contacts code of electronic equipment and corresponding access rights;
Acquisition module 12, for obtaining the access request that access device sends, comprising the identification of contacts code of access device, access request is sent to authentication module in access request;
Authentication module 14, carries out authentication for the identification of contacts code according to access device in databases of contact information, determines whether access device belongs to legitimate device, and informing network link block;
Network connecting module 16, for the notice according to authentication module, will be defined as the access device access active wireless network of legitimate device.
Preferably, the identification of contacts code stored in databases of contact information is the telephone number of contact person, and the identification of contacts code of access device is the my phone numbers of access device.
In the present embodiment the operation principle of each module and corresponding beneficial effect and preceding method embodiment similar, specifically can consult aforesaid content, not repeat them here.
In the technical scheme of the present embodiment, the access request carrying identification of contacts code that the equipment connecting device that AP holds electronic equipment to carry sends by obtaining access device, information matches is carried out in the databases of contact information preset, if the identification of contacts code of access device and access rights identical with a certain identification of contacts code prestored in information database access for allowing, the contact person of the permission access that the use user of this access device holds electronic equipment to arrange for this AP is then described, then determine that this access device is that legitimate device allows its access active wireless network.By the mode of the authenticating identity to access equipment use user, judge whether to allow this access device to access active wireless network, without the need to informing the password of access device access active wireless network, simplify the network connection procedure of SoftAP, and improve the fail safe of SoftAP networking connection.
Fig. 5 is present device jockey second example structure schematic diagram, and as shown in Figure 5, this device comprises databases of contact information 20, acquisition module 21, authentication module 22, network connecting module 23, memory module 24, wherein:
Databases of contact information 20, comprises AP and holds the identification of contacts code of electronic equipment and corresponding access rights;
Acquisition module 21, for obtaining the access request that access device sends, comprising the identification of contacts code of access device and the equipment identification information of access device, access request is sent to authentication module in access request;
Authentication module 22, carries out authentication for the identification of contacts code according to access device in databases of contact information, determines whether access device belongs to legitimate device, and informing network link block;
Network connecting module 23, for the notice according to authentication module, will be defined as the access device access active wireless network of legitimate device.
Memory module 24, stores for being sent in databases of contact information by equipment identification information.
Further, authentication module 22 also for:
Whether the identification of contacts code determining access device mates with the identification of contacts code stored in databases of contact information; If the match is successful for the identification of contacts code stored in the identification of contacts code of access device and databases of contact information, then determine whether to allow identification of contacts code access active wireless network; If allow identification of contacts code access active wireless network, then determine whether the equipment identification information of access device mates with the equipment identification information stored in databases of contact information; If the match is successful for the equipment identification information stored in the equipment identification information of access device and databases of contact information, then determine that access device belongs to legitimate device.
Further, the contacts list application that can show the identification of contacts code stored in databases of contact information preset by AP end electronic equipment, and equipment connecting device also comprises:
Mutual display module 25, in contacts list application, highlights the identification of contacts code of the access device being connected to active wireless network.
Preferably, the identification of contacts code stored in databases of contact information 20 is the telephone number of contact person, and the identification of contacts code of access device is the my phone numbers of access device.
Further, acquisition module 21 also disconnects for obtaining the disconnection request that access device is connected to active wireless network;
Network connecting module 23 also for according to disconnecting the equipment identification information asking to determine access device, disconnects the connection of access device and active wireless network.
Further, this device also comprises:
Searching module 26, for searching databases of contact information according to equipment identification information, determining the identification of contacts code of access device;
Mutual display module 25 also in contacts list application, cancels the identification of contacts code highlighting the access device disconnecting active wireless network.
In the present embodiment the operation principle of each module and corresponding beneficial effect and preceding method embodiment similar, specifically can consult aforesaid content, not repeat them here.
In the technical scheme of the present embodiment, the access request carrying identification of contacts code that the equipment connecting device that AP holds electronic equipment to carry sends by obtaining access device, information matches is carried out in the databases of contact information preset, if the identification of contacts code of access device, equipment identification information and a certain identification of contacts code prestored in information database and equipment identification information all identical, one of contact person that the use user of this access device is this AP end electronic equipment is then described, and its access device used is identical with equipment when once accessing, then determine that this access device is that legitimate device allows its access active wireless network.By carrying out the mode of two aspect authentications to access equipment use user identity and facility information, judge whether to allow this access device to access active wireless network, without the need to informing the password of access device access active wireless network, simplify the network connection procedure of SoftAP, and improve the fail safe of SoftAP networking connection.By disconnecting management, access device and AP is facilitated to hold access and the disconnection of electronic equipment unrestricted choice network.
Embodiments provide a kind of AP and hold electronic equipment, comprise touch-sensitive display and equipment connecting device, this touch-sensitive display, comprises human-computer interaction interface; Described in this equipment connecting device refers to above.
The embodiment of the present invention additionally provides a kind of AP and holds electronic equipment, comprising: touch-sensitive display, processor, for storing the memory of described processor executable, wherein, touch-sensitive display, comprises human-computer interaction interface; Memory is preset and is comprised the described AP end identification of contacts code of electronic equipment and the databases of contact information of corresponding access rights; Wherein, processor is configured to:
Obtain the access request that access device sends, in described access request, comprise the identification of contacts code of described access device;
Identification of contacts code according to described access device carries out authentication in described databases of contact information, determines whether described access device belongs to legitimate device;
The described access device access active wireless network of legitimate device will be belonged to.
The present embodiment additionally provides a kind of computer program in conjunction with electronic equipment, described computer program comprises computer-readable storage medium and is embedded in computer program mechanism wherein, concrete, storage medium comprises default AP and holds the identification of contacts code of electronic equipment and the databases of contact information of corresponding access rights, and described computer program mechanism comprises the instruction performing following steps:
Obtain the access request that access device sends, in described access request, comprise the identification of contacts code of described access device;
Identification of contacts code according to described access device carries out authentication in described databases of contact information, determines whether described access device belongs to legitimate device;
The described access device access active wireless network of legitimate device will be belonged to.
Each embodiment in this specification all adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar part mutually see.
It should be noted that, in this article, the such as relational terms of first and second grades and so on is only used for an entity or operation to separate with another entity or operating space, and not necessarily requires or imply the relation that there is any this reality between these entities or operation or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, article or terminal equipment and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, article or terminal equipment.When not more restrictions, the key element limited by statement " comprising ... " or " comprising ... ", and be not precluded within process, method, article or the terminal equipment comprising described key element and also there is other key element.In addition, in this article, " be greater than ", " being less than ", " exceeding " etc. be interpreted as and do not comprise this number; " more than ", " below ", " within " etc. be interpreted as and comprise this number.
Those skilled in the art should understand, the various embodiments described above can be provided as method, device or computer program.These embodiments can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.The hardware that all or part of step in the method that the various embodiments described above relate to can carry out instruction relevant by program has come, described program can be stored in the storage medium that computer equipment can read, for performing all or part of step described in the various embodiments described above method.Described computer equipment, includes but not limited to: personal computer, server, all-purpose computer, special-purpose computer, the network equipment, embedded device, programmable device, intelligent mobile terminal, intelligent home device, wearable intelligent equipment, vehicle intelligent equipment etc.; Described storage medium, includes but not limited to: the storage of RAM, ROM, magnetic disc, tape, CD, flash memory, USB flash disk, portable hard drive, storage card, memory stick, the webserver, network cloud storage etc.
The various embodiments described above describe with reference to the flow chart of method, equipment (system) and computer program according to embodiment and/or block diagram.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block diagram and/or square frame and flow chart and/or block diagram and/or square frame.These computer program instructions can being provided to the processor of computer equipment to produce a machine, making the instruction performed by the processor of computer equipment produce device for realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer equipment readable memory that works in a specific way of vectoring computer equipment, the instruction making to be stored in this computer equipment readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be loaded on computer equipment, make to perform sequence of operations step on a computing device to produce computer implemented process, thus the instruction performed on a computing device is provided for the step realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
Although be described the various embodiments described above; but those skilled in the art are once obtain the basic creative concept of cicada; then can make other change and amendment to these embodiments; so the foregoing is only embodiments of the invention; not thereby scope of patent protection of the present invention is limited; every utilize specification of the present invention and accompanying drawing content to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical fields, be all in like manner included within scope of patent protection of the present invention.

Claims (15)

1. an equipment connection method, it is characterized in that, the AP be applied to as software router holds electronic equipment, and described AP end electronic equipment is preset and comprised the described AP end identification of contacts code of electronic equipment and the databases of contact information of corresponding access rights, and described equipment connection method comprises:
Obtain the access request that access device sends, in described access request, comprise the identification of contacts code of described access device;
Identification of contacts code according to described access device carries out authentication in described databases of contact information, determines whether described access device belongs to legitimate device;
The described access device access active wireless network of legitimate device will be belonged to.
2. equipment connection method according to claim 1, it is characterized in that, the identification of contacts code stored in described databases of contact information is the telephone number of described contact person, and the identification of contacts code of described access device is the my phone numbers of described access device.
3. equipment connection method according to claim 1, is characterized in that, also comprises the equipment identification information of described access device in described access request, and described method also comprises:
Described equipment identification information is stored in described databases of contact information.
4. equipment connection method according to claim 3, is characterized in that, the described identification of contacts code according to described access device carries out authentication in described databases of contact information, determines whether described access device belongs to legitimate device, comprising:
Determine whether the identification of contacts code of described access device mates with the identification of contacts code stored in described databases of contact information;
If the match is successful for the identification of contacts code stored in the identification of contacts code of described access device and described databases of contact information, then determine whether to allow described identification of contacts code to access described active wireless network;
If allow described identification of contacts code to access described active wireless network, then determine whether the equipment identification information of described access device mates with the equipment identification information stored in described databases of contact information;
If the match is successful for the equipment identification information stored in the equipment identification information of described access device and described databases of contact information, then determine that described access device belongs to legitimate device.
5. equipment connection method according to claim 1, is characterized in that, the contacts list application that can show the identification of contacts code stored in described databases of contact information preset by described AP end electronic equipment, and described method also comprises:
In described contacts list application, highlight the identification of contacts code of the described access device being connected to described active wireless network.
6., according to the arbitrary described equipment connection method of claim 3 to 5, it is characterized in that, described method also comprises:
Obtain and disconnect the disconnection request that described access device is connected to active wireless network;
Disconnect according to described the equipment identification information that described access device is determined in request, disconnect the connection of described access device and described active wireless network.
7. equipment connection method according to claim 6, is characterized in that, described method also comprises:
Search described databases of contact information according to described equipment identification information, determine the described identification of contacts code of described access device;
In described contacts list application, cancel the identification of contacts code highlighting the described access device disconnecting described active wireless network.
8. an equipment connecting device, is characterized in that, the AP be applied to as software router holds electronic equipment, and described equipment connecting device comprises databases of contact information, acquisition module, authentication module and network connecting module:
Described databases of contact information, comprises described AP and holds the identification of contacts code of electronic equipment and corresponding access rights;
Described acquisition module, for obtaining the access request that access device sends, comprising the identification of contacts code of described access device, described access request is sent to described authentication module in described access request;
Described authentication module, carries out authentication for the identification of contacts code according to described access device in described databases of contact information, determines whether described access device belongs to legitimate device, and notifies described network connecting module;
Described network connecting module, for the notice according to described authentication module, will be defined as the described access device access active wireless network of legitimate device.
9. equipment connecting device according to claim 8, it is characterized in that, the identification of contacts code stored in described databases of contact information is the telephone number of described contact person, and the identification of contacts code of described access device is the my phone numbers of described access device.
10. equipment connecting device according to claim 8, is characterized in that, also comprises the equipment identification information of described access device in described access request, and described equipment connecting device also comprises:
Memory module, stores for being sent in described databases of contact information by described equipment identification information.
11. equipment connecting devices according to claim 10, is characterized in that, described authentication module also for:
Determine whether the identification of contacts code of described access device mates with the identification of contacts code stored in described databases of contact information;
If the match is successful for the identification of contacts code stored in the identification of contacts code of described access device and described databases of contact information, then determine whether to allow described identification of contacts code to access described active wireless network;
If allow described identification of contacts code to access described active wireless network, then determine whether the equipment identification information of described access device mates with the equipment identification information stored in described databases of contact information;
If the match is successful for the equipment identification information stored in the equipment identification information of described access device and described databases of contact information, then determine that described access device belongs to legitimate device.
12. equipment connecting devices according to claim 8, is characterized in that, the contacts list application that can show the identification of contacts code stored in described databases of contact information preset by described AP end electronic equipment, and described equipment connecting device also comprises:
Mutual display module, in described contacts list application, highlights the identification of contacts code of the described access device being connected to described active wireless network.
13., according to claim 10 to 12 arbitrary described equipment connecting devices, is characterized in that, described acquisition module also disconnects for obtaining the disconnection request that described access device is connected to active wireless network;
Described network connecting module also for disconnecting according to described the equipment identification information that described access device is determined in request, disconnects the connection of described access device and described active wireless network.
14. equipment connecting devices according to claim 13, is characterized in that, described device also comprises:
Searching module, for searching described databases of contact information according to described equipment identification information, determining the described identification of contacts code of described access device;
Described mutual display module also in described contacts list application, cancels the identification of contacts code highlighting the described access device disconnecting described active wireless network.
15. 1 kinds of AP hold electronic equipment, it is characterized in that, comprising:
Touch-sensitive display;
Processor;
And for storing the memory of described processor executable, described memory is preset and is comprised the described AP end identification of contacts code of electronic equipment and the databases of contact information of corresponding access rights;
Wherein, described processor is configured to:
Obtain the access request that access device sends, in described access request, comprise the identification of contacts code of described access device;
Identification of contacts code according to described access device carries out authentication in described databases of contact information, determines whether described access device belongs to legitimate device;
The described access device access active wireless network of legitimate device will be belonged to.
CN201510053964.7A 2015-02-03 2015-02-03 Equipment connecting method and device and AP (access point) end electronic equipment Pending CN104581727A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510053964.7A CN104581727A (en) 2015-02-03 2015-02-03 Equipment connecting method and device and AP (access point) end electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510053964.7A CN104581727A (en) 2015-02-03 2015-02-03 Equipment connecting method and device and AP (access point) end electronic equipment

Publications (1)

Publication Number Publication Date
CN104581727A true CN104581727A (en) 2015-04-29

Family

ID=53096713

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510053964.7A Pending CN104581727A (en) 2015-02-03 2015-02-03 Equipment connecting method and device and AP (access point) end electronic equipment

Country Status (1)

Country Link
CN (1) CN104581727A (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104853353A (en) * 2015-05-13 2015-08-19 广东欧珀移动通信有限公司 Access authenticating method and apparatus of wireless access point
CN105260650A (en) * 2015-10-22 2016-01-20 广东威创视讯科技股份有限公司 Mobile device accessing method and system
CN105607498A (en) * 2015-12-31 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Intelligent household equipment matching method, apparatus, and system, and equipment
CN105828454A (en) * 2015-07-28 2016-08-03 维沃移动通信有限公司 Method for connecting network, device and WiFi routing equipment
CN105871841A (en) * 2016-03-31 2016-08-17 乐视控股(北京)有限公司 Method and device for logging in target equipment and generating login information
CN106059788A (en) * 2016-05-06 2016-10-26 海信集团有限公司 Identifying method and device of intelligent household equipment
WO2017008556A1 (en) * 2015-07-13 2017-01-19 中兴通讯股份有限公司 Authentication method and device for wireless access point and management platform
CN106534451A (en) * 2016-12-05 2017-03-22 奇酷互联网络科技(深圳)有限公司 Information display method and apparatus of access device list
WO2017071094A1 (en) * 2015-10-30 2017-05-04 小米科技有限责任公司 Device control method and apparatus
CN106792682A (en) * 2016-12-05 2017-05-31 奇酷互联网络科技(深圳)有限公司 The cut-in method of WIFI network, device and terminal device
CN106899976A (en) * 2017-03-23 2017-06-27 努比亚技术有限公司 A kind of wireless network management method and electronic equipment
CN107249220A (en) * 2017-07-25 2017-10-13 上海与德科技有限公司 A kind of connection method of network communication and device
CN107295519A (en) * 2017-08-21 2017-10-24 深圳市信锐网科技术有限公司 A kind of wireless network access method, apparatus and system
WO2017181919A1 (en) * 2016-04-18 2017-10-26 肖华薇 Method of connecting to wireless local area network, device, and system
CN107466088A (en) * 2016-06-06 2017-12-12 西安中兴新软件有限责任公司 A kind of WiFi cut-in methods and device
CN109618344A (en) * 2019-01-25 2019-04-12 刘美连 A kind of secure connection method and device of wireless monitoring equipment
CN109874140A (en) * 2019-03-14 2019-06-11 深圳市信锐网科技术有限公司 A kind of network safety protection method, device, equipment and storage medium
CN111065086A (en) * 2020-01-16 2020-04-24 Tcl移动通信科技(宁波)有限公司 SIM (subscriber identity module) identification method and device, storage medium and mobile terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130086266A1 (en) * 2007-06-15 2013-04-04 Cisco Technology, Inc. Apparatus and method for applying network policy at a network device
US20130088982A1 (en) * 2011-10-05 2013-04-11 Samsung Electronics Co., Ltd. Method and apparatus for controlling coverage of wireless transceiver
CN103813330A (en) * 2012-11-15 2014-05-21 中兴通讯股份有限公司 Communication terminal and system and authority management method
CN104159226A (en) * 2014-07-24 2014-11-19 小米科技有限责任公司 Network connection method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130086266A1 (en) * 2007-06-15 2013-04-04 Cisco Technology, Inc. Apparatus and method for applying network policy at a network device
US20130088982A1 (en) * 2011-10-05 2013-04-11 Samsung Electronics Co., Ltd. Method and apparatus for controlling coverage of wireless transceiver
CN103813330A (en) * 2012-11-15 2014-05-21 中兴通讯股份有限公司 Communication terminal and system and authority management method
CN104159226A (en) * 2014-07-24 2014-11-19 小米科技有限责任公司 Network connection method and device

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104853353A (en) * 2015-05-13 2015-08-19 广东欧珀移动通信有限公司 Access authenticating method and apparatus of wireless access point
CN104853353B (en) * 2015-05-13 2019-02-05 Oppo广东移动通信有限公司 A kind of access authentication method and apparatus of wireless access point
WO2017008556A1 (en) * 2015-07-13 2017-01-19 中兴通讯股份有限公司 Authentication method and device for wireless access point and management platform
CN105828454A (en) * 2015-07-28 2016-08-03 维沃移动通信有限公司 Method for connecting network, device and WiFi routing equipment
CN105828454B (en) * 2015-07-28 2019-07-26 维沃移动通信有限公司 A kind of method, apparatus connecting network and a kind of WIFI routing device
CN105260650B (en) * 2015-10-22 2018-12-11 广东威创视讯科技股份有限公司 Mobile device cut-in method and system
CN105260650A (en) * 2015-10-22 2016-01-20 广东威创视讯科技股份有限公司 Mobile device accessing method and system
WO2017071094A1 (en) * 2015-10-30 2017-05-04 小米科技有限责任公司 Device control method and apparatus
CN105607498B (en) * 2015-12-31 2019-06-11 宇龙计算机通信科技(深圳)有限公司 A kind of matched method, apparatus of smart home device, equipment and system
CN105607498A (en) * 2015-12-31 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Intelligent household equipment matching method, apparatus, and system, and equipment
CN105871841A (en) * 2016-03-31 2016-08-17 乐视控股(北京)有限公司 Method and device for logging in target equipment and generating login information
WO2017181919A1 (en) * 2016-04-18 2017-10-26 肖华薇 Method of connecting to wireless local area network, device, and system
CN106059788A (en) * 2016-05-06 2016-10-26 海信集团有限公司 Identifying method and device of intelligent household equipment
CN106059788B (en) * 2016-05-06 2019-09-17 海信集团有限公司 The recognition methods of smart home device and device
WO2017210977A1 (en) * 2016-06-06 2017-12-14 中兴通讯股份有限公司 Method and apparatus for management terminal to access wi-fi
CN107466088A (en) * 2016-06-06 2017-12-12 西安中兴新软件有限责任公司 A kind of WiFi cut-in methods and device
CN106534451B (en) * 2016-12-05 2019-10-25 奇酷互联网络科技(深圳)有限公司 The information displaying method and device of access device list
CN106792682A (en) * 2016-12-05 2017-05-31 奇酷互联网络科技(深圳)有限公司 The cut-in method of WIFI network, device and terminal device
CN106534451A (en) * 2016-12-05 2017-03-22 奇酷互联网络科技(深圳)有限公司 Information display method and apparatus of access device list
CN106899976A (en) * 2017-03-23 2017-06-27 努比亚技术有限公司 A kind of wireless network management method and electronic equipment
CN107249220A (en) * 2017-07-25 2017-10-13 上海与德科技有限公司 A kind of connection method of network communication and device
CN107295519A (en) * 2017-08-21 2017-10-24 深圳市信锐网科技术有限公司 A kind of wireless network access method, apparatus and system
CN109618344A (en) * 2019-01-25 2019-04-12 刘美连 A kind of secure connection method and device of wireless monitoring equipment
CN109618344B (en) * 2019-01-25 2020-06-23 广东省恒博信息有限公司 Safe connection method and device of wireless monitoring equipment
CN109874140A (en) * 2019-03-14 2019-06-11 深圳市信锐网科技术有限公司 A kind of network safety protection method, device, equipment and storage medium
CN111065086A (en) * 2020-01-16 2020-04-24 Tcl移动通信科技(宁波)有限公司 SIM (subscriber identity module) identification method and device, storage medium and mobile terminal

Similar Documents

Publication Publication Date Title
CN104581727A (en) Equipment connecting method and device and AP (access point) end electronic equipment
CN104967997B (en) A kind of Wi-Fi cut-in method, Wi-Fi equipment, terminal device and system
CN109996234B (en) Network connection method, hotspot terminal and management terminal
CN103415016A (en) Mobile WIFI hotspot connection processing method and system
WO2015196664A1 (en) Wireless routing device and method for preventing use of network for free, and computer storage medium
US20200228981A1 (en) Authentication method and device
CN103415012A (en) Authentication method and authentication device of wireless router
CN104797003B (en) A kind of method and device for switching intelligent terminal user
CN102413220B (en) Method for controlling right of using connection function and mobile terminal
CN103108327A (en) Method, device and system of verification of safety association between terminal equipment and user card
CN104486417A (en) Account security management system and method based on cloud service
TW201729562A (en) Server, mobile terminal, and internet real name authentication system and method
WO2018010480A1 (en) Network locking method for esim card, terminal, and network locking authentication server
CN107396283A (en) A kind of router wireless connection authentication method and system
CN102984335A (en) Identity authentication method, equipment and system for making fixed-line call
CN109639419A (en) Cryptographic key protection method, cipher key storage device and terminal device
CN104580170A (en) Data reading method and device
CN109413648A (en) Access control method, terminal, smart card, background server and storage medium
CN114040411B (en) Equipment binding method and device, electronic equipment and storage medium
CN112819454B (en) Payment method, gateway device, server and storage medium
CN102202291B (en) Card-free terminal, service access method and system thereof, terminal with card and bootstrapping server function (BSF)
CN115801299B (en) Meta universe identity authentication method, device, equipment and storage medium
CN107454557B (en) Router connection method and system
CN105704705A (en) Method for switching terminals with shared eSIM information, terminal and server
CN109067715B (en) Verification method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 350003 Fuzhou Gulou District, Fujian, software Avenue, building 89, No. 18

Applicant after: FUZHOU ROCKCHIP ELECTRONICS CO., LTD.

Address before: 350003 Fuzhou Gulou District, Fujian, software Avenue, building 89, No. 18

Applicant before: Fuzhou Rockchip Semiconductor Co., Ltd.

COR Change of bibliographic data
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150429

WD01 Invention patent application deemed withdrawn after publication