CN105142202A - Access control method, router and terminal equipment - Google Patents

Access control method, router and terminal equipment Download PDF

Info

Publication number
CN105142202A
CN105142202A CN201510481880.3A CN201510481880A CN105142202A CN 105142202 A CN105142202 A CN 105142202A CN 201510481880 A CN201510481880 A CN 201510481880A CN 105142202 A CN105142202 A CN 105142202A
Authority
CN
China
Prior art keywords
communication
router
terminal equipment
verify data
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510481880.3A
Other languages
Chinese (zh)
Inventor
张藜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201510481880.3A priority Critical patent/CN105142202A/en
Publication of CN105142202A publication Critical patent/CN105142202A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses an access control method, a router and terminal equipment. The implementation of the access control method comprises the following steps that the router uses a first wireless communication mode to transmit authentication data; the router receives an access request from the terminal equipment, wherein the access request carries the authentication data; the router uses the transmitted authentication data to authenticate the authentication data in an authentication request; if the authentication is failed, then the terminal equipment is rejected to be accessed; if the authentication is passed, then the terminal equipment is allowed to be accessed; after the terminal equipment is accessed, the terminal equipment uses a second wireless communication mode to perform data interaction; the effective communication range of the first wireless communication mode is smaller than that of the second wireless communication mode. The terminal can acquire the authentication data only in a smaller range, so that the authentication data can be prevented from being acquired in a larger range (usually the terminal equipment outside a sight-distance range), so as to prevent the illegal access of this terminal equipment.

Description

A kind of connection control method, router and terminal equipment
Technical field
The present invention relates to communication technical field, particularly a kind of connection control method, router and terminal equipment.
Background technology
Wireless network (wirelessnetwork) is the network adopting wireless communication technology to realize.Wireless network had both comprised the global voice and the data network that allow user to set up remote-wireless connection, also comprise near radio connects the infrared technology and radio-frequency technique be optimized, very similar with the purposes of cable network, maximum difference is the difference of transmission medium, utilize radiotechnics to replace netting twine, can backup each other with cable network.
Wireless Fidelity (WIFI), as one of communication be most widely used at present, is a kind of technology that the terminal equipment such as PC, mobile terminal wirelessly can be connected to each other.
Wireless network refers to " Wireless Fidelity " at the category of WLAN (wireless local area network), is a kind of commercial verification, and be also a kind of Wireless networking technologies, connected computer by netting twine in the past, Wireless Fidelity is then networked by radio wave simultaneously; Common is exactly a wireless router, the effective range so covered at the electric wave of this wireless router can adopt Wireless Fidelity connected mode to network, if wireless router is connected to a Wireline or other online circuit, be then otherwise known as focus.
In WIFI network, terminal equipment is by after the certification of router, then can access wireless router, then use WIFI.For private network, need to be encrypted to prevent unauthorized user from taking resource to WIFI; Current common way is for wireless router arranges password, and the user only obtaining password just can be linked into this wireless router.
Adopt above scheme, the password arranged in wireless router usually crack by unauthorized terminal equipment (such as at present comparatively conventional WIFI skeleton key), these unauthorized users, after acquisition password, still can easily realize rubbing net.Therefore above scheme is difficult to prevent unauthorized terminal equipment from illegally accessing.
Summary of the invention
Embodiments providing a kind of connection control method, router and terminal equipment, illegally accessing for preventing unauthorized terminal equipment.
A kind of connection control method, comprising:
Router uses the first communication to launch verify data;
Described router receives the access request of carrying verify data from terminal equipment;
Described router uses the verify data of launching to carry out certification to the verify data in described authentication request, if authentification failure, then refuse access, if certification is passed through, then allow described terminal equipment to access, after described terminal equipment access, use the second communication to carry out data interaction with described terminal equipment; Described first communication effective communication distance is less than the effective communication distance of described second communication.
A kind of connection control method, comprising:
Terminal equipment uses the first communication reception from the verify data of router;
Described terminal equipment sends the access request of carrying described verify data to described router;
Described terminal equipment, after certification is passed through, accesses described router, then uses the second communication to carry out data interaction with described router; Described first communication effective communication distance is less than the effective communication distance of described second communication.
A kind of router, comprising:
First communication unit, launches verify data for using the first communication;
Receiving element, for receiving the access request of carrying verify data from terminal equipment;
Authentication ' unit, carries out certification for using the verify data of transmitting to the verify data in described authentication request;
Access control unit, if for authentification failure, then refuses access, if certification is passed through, then allows described terminal equipment to access;
Second communication unit, for using the second communication to carry out data interaction with described terminal equipment after described terminal equipment access; Described first communication effective communication distance is less than the effective communication distance of described second communication.
A kind of terminal equipment, comprising:
First communication unit, for using the first communication reception from the verify data of router;
Transmitting element, for sending the access request of carrying described verify data to described router;
Access unit, for after certification is passed through, accesses described router;
Second communication unit, for after the described router of access, uses the second communication to carry out data interaction with described router; Described first communication effective communication distance is less than the effective communication distance of described second communication.
As can be seen from the above technical solutions, the embodiment of the present invention has the following advantages: because above-mentioned first communication effective communication distance is less than the effective communication distance of above-mentioned second communication, the first communication is used to launch password to terminal equipment, the second communication is used to carry out data interaction, terminal ability access authentication data so only in more among a small circle, prevent from being in (terminal equipment normally outside horizon range) access authentication data in a big way, thus prevent this part terminal equipment from illegally accessing.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly introduced, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is embodiment of the present invention method flow schematic diagram;
Fig. 2 is embodiment of the present invention method flow schematic diagram;
Fig. 3 is embodiment of the present invention system architecture intention;
Fig. 4 is embodiment of the present invention method flow schematic diagram;
Fig. 5 is embodiment of the present invention router topology schematic diagram;
Fig. 6 is embodiment of the present invention terminal equipment structural representation;
Fig. 7 is embodiment of the present invention router topology schematic diagram;
Fig. 8 is embodiment of the present invention terminal equipment structural representation;
Fig. 9 is embodiment of the present invention handset structure schematic diagram.
Embodiment
In order to make the object, technical solutions and advantages of the present invention clearly, below in conjunction with accompanying drawing, the present invention is described in further detail, and obviously, described embodiment is only a part of embodiment of the present invention, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making other embodiments all obtained under creative work prerequisite, belong to the scope of protection of the invention.
Embodiments provide a kind of connection control method, as shown in Figure 1, comprising:
101: router uses the first communication to launch verify data;
Have radio communication function by known its of the function of router, the router in the present embodiment can be wireless router, also can be to have wired and router that is radio communication function concurrently." first " and " second " is to distinguish two kinds of different communications, does not have the implication that other technologies limit.Verify data is the data for carrying out authentication, can be password usually, and can be that other have the data of authentication function, its concrete manifestation form affect the realization of the embodiment of the present invention yet, and therefore the embodiment of the present invention does not do uniqueness restriction to this.
102: above-mentioned router receives the access request of carrying verify data from terminal equipment;
In the present embodiment, can carry verify data in access request, this verify data may be the verify data that router is launched, and also may not be the verify data that router is launched, need subsequent authentication to confirm.Even the verify data that router is launched, also stylistic difference can be had, illustrate: the verify data that router is launched can be: encryption head+authentication password, access request can only comprise above-mentioned authentication password, also can comprise above-mentioned complete: encryption head+authentication password.Here terminal equipment can be mobile terminal, also can be the terminal of desktop computer and so on, as long as the terminal of wireless access can be used all to be fine in theory.It is more common that mobile terminal rubs net, and in fact desktop computer rubs the application scenarios of net also very generally, the WIF etc. that the WIFI of Stall businessman rubs in resident family, the user in next door rubs neighbours of such as second floor.
103: above-mentioned router uses the verify data of launching to carry out certification to the verify data in above-mentioned authentication request, if authentification failure, then refuse access, if certification is passed through, then allow above-mentioned terminal equipment to access, after above-mentioned terminal equipment access, use the second communication to carry out data interaction with above-mentioned terminal equipment; Above-mentioned first communication effective communication distance is less than the effective communication distance of above-mentioned second communication.
The most common way of certification is comparison, and in such cases, if what comprise in verify data is authentication password, so verification process can be whether the authentication password that comparison is launched is consistent with the authentication password received.Authentication password also can and incomplete same but meet predetermined rule, such as: specify in verify data and need the authentication password returned to be the authentication password of authentication password after a certain calculating launched, be all fine.The conversion process of authentication password and concrete verification process, those skilled in the art can select arbitrarily, do not do uniqueness limit this embodiment of the present invention.
In above embodiment, because above-mentioned first communication effective communication distance is less than the effective communication distance of above-mentioned second communication, the first communication is used to launch password to terminal equipment, the second communication is used to carry out data interaction, terminal ability access authentication data so only in more among a small circle, prevent from being in (terminal equipment normally outside horizon range) access authentication data in a big way, thus prevent this part terminal equipment from illegally accessing.
As a rule, the terminal equipment distance of rubbing net can be distant not near network ownership, if the effective communication distance of the first communication is closer, such as: only have Centimeter Level or decimeter grade, so rub network users and cannot obtain router password beyond network ownership's horizon range.
The embodiment of the present invention additionally provides the concrete send mode of two kinds of verify datas, specific as follows:
One, above-mentioned router uses the first communication transmitting verify data to comprise:
Router take predetermined time as interval, periodically uses the verify data of the first communication broadcast stochastic generation.
The present embodiment adopts the mode of periodic transmission random authentication data, ceaselessly can convert verify data, significantly increases the difficulty that verify data is cracked.The mode of this conversion verify data is completed automatically by router, does not need artificial setting, therefore uses difficulty very low.
Two, before above-mentioned router uses the first communication transmitting verify data, also comprise:
Router receives the verify data using the first communication to send from terminal equipment and obtains request;
Above-mentioned router uses the first communication transmitting verify data to comprise:
Above-mentioned router uses the first communication to send the verify data of holding for the purpose of above-mentioned terminal equipment to above-mentioned terminal equipment.
Front a kind of implementation realizes with the forms of broadcasting, the destination that the transmission of verify data is not fixed; The mode of response type replys verify data that what the present embodiment then adopted is realizes.In actual applications, verify data can be avoided too much to be sent cause easily by the risk intercepted.
In the embodiment above, according to periodically generating verify data, after terminal equipment access network, needing to use new verify data certification again, if authentification failure will suspension, if authentication success, can access state be kept.In actual use, the user of terminal equipment may be needed, need again to enter within the scope of the efficient communication of the first communication, therefore the embodiment of the present invention can have another mode, that is: after above-mentioned wireless terminal has accessed, the second communication is used to send the verify data of stochastic generation to the terminal equipment accessed.Subsequent authentication procedure can not repeat them here with reference to conventional identifying procedure.In addition, also can set, use the second communication to send the time of the verify data of stochastic generation, such as: one hour, or two hours; This time can be determined as required, after the setting of this time, again entering within the scope of the first communication coverage and regaining verify data, namely regaining mandate by needing the user of terminal equipment at this moment.
The embodiment of the present invention additionally provides the optional implementation of the first communication, it should be noted that, as long as to be less than the effective communication distance of the second communication just passable for the first communication effective communication distance in theory, be not limited in following citing, therefore following citing should not be construed as possible preferred implementation and limits the uniqueness of the embodiment of the present invention, specific as follows: above-mentioned first communication comprises: ultrasonic wireless communication or near-field communication.
The embodiment of the present invention additionally provides the optional implementation of the second communication, it should be noted that, as long as to be greater than the effective communication distance of the first communication just passable for the second communication effective communication distance in theory, be not limited in following citing, therefore following citing should not be construed as possible preferred implementation and limits the uniqueness of the embodiment of the present invention, specific as follows: above-mentioned second communication comprises: Wireless Fidelity.
The embodiment of the present invention additionally provides a kind of connection control method, as shown in Figure 2, comprising:
201: terminal equipment uses the first communication reception from the verify data of router;
By the function of router and terminal equipment known both all there is radio communication function, the router in the present embodiment can be wireless router, and terminal equipment can comprise any terminal equipment of mobile phone.Verify data is the data for carrying out authentication, can be password usually, and can be that other have the data of authentication function, its concrete manifestation form affect the realization of the embodiment of the present invention yet, and therefore the embodiment of the present invention does not do uniqueness restriction to this.Above-mentioned verify data can be broadcast also can be the verify data having destination, two kinds of modes all do not affect the realization of the embodiment of the present invention.
202: above-mentioned terminal equipment sends the access request of carrying above-mentioned verify data to above-mentioned router;
In the present embodiment, can carry verify data in access request, this verify data may be the verify data that router is launched, and also may be the verify data after the verify data conversion of router transmitting, need subsequent authentication to confirm.Even the verify data that router is launched, also stylistic difference can be had, illustrate: the verify data that router is launched can be: encryption head+authentication password, access request can only comprise above-mentioned authentication password, also can comprise above-mentioned complete: encryption head+authentication password.
203: above-mentioned terminal equipment, after certification is passed through, accesses above-mentioned router, then use the second communication to carry out data interaction with above-mentioned router; Above-mentioned first communication effective communication distance is less than the effective communication distance of above-mentioned second communication.
In above embodiment, because above-mentioned first communication effective communication distance is less than the effective communication distance of above-mentioned second communication, the first communication is used to launch password to terminal equipment, the second communication is used to carry out data interaction, terminal ability access authentication data so only in more among a small circle, prevent from being in (terminal equipment normally outside horizon range) access authentication data in a big way, thus prevent this part terminal equipment from illegally accessing.
As a rule, the terminal equipment distance of rubbing net can be distant not near network ownership, if the effective communication distance of the first communication is closer, such as: only have Centimeter Level or decimeter grade, so rub network users and cannot obtain router password beyond network ownership's horizon range.
The embodiment of the present invention additionally provides the concrete receive mode of two kinds of verify datas, specific as follows:
One, the verify data that above-mentioned terminal equipment uses the first communication to receive from router comprises:
It take predetermined time as interval that terminal equipment uses the first communication to receive above-mentioned router, the verify data of the stochastic generation of periodically broadcast.
The present embodiment adopts the mode of periodic transmission random authentication data, ceaselessly can convert verify data, significantly increases the difficulty that verify data is cracked.The mode of this conversion verify data is completed automatically by router, does not need artificial setting, therefore uses difficulty very low.
Two, before above-mentioned terminal equipment uses the verify data of the first communication reception from router, also comprise:
Terminal equipment uses the first communication to send card data acquisition request to router;
The verify data that above-mentioned terminal equipment uses the first communication to receive from router comprises:
Above-mentioned terminal equipment receives above-mentioned router and uses the first communication to be the verify data of above-mentioned terminal equipment to the destination that above-mentioned terminal equipment sends.
Front a kind of implementation realizes with the forms of broadcasting, the destination that the transmission of verify data is not fixed; The mode of response type replys verify data that what the present embodiment then adopted is realizes.In actual applications, verify data can be avoided too much to be sent cause easily by the risk intercepted.
Following examples are described in detail for a concrete application scenarios to the use of the embodiment of the present invention in product side and the specific implementation at equipment side.
In the citing of the present embodiment, the first communication selects ultrasonic wireless communication (current sound wave pays the communication used).It is the transmission utilizing sound wave occurred recently that sound wave pays, the communication mode that the near field completing two equipment identifies.Its detailed process is, in the cell-phone customer terminal of Third-party payment product, is built-in with " sound wave payment " function, and after user opens this function, aim at the microphone of beneficiary with mobile microphone, mobile phone can play the sound of one section " Karaoke ".This sound wave pays to be actually and sends data to mobile phone, and mobile phone only accepts data, and timeliness is short, strong security, and fail safe is high.Even recorded down this section of sound by people also can not to be stolen the situation of information.Carry out the password exchange of WIFI hot spot based on this technology, only closely accepting to obtain password.
Have at present on vending machine and there is sound wave payment function, user can go to buy the commodity in vending machine by mobile phone, during use, one section of ultrasonic wave play by mobile phone, sound like is " Karaoke ", then vending machine will process after hearing this section of sound wave automatically, user inputs password on oneself mobile phone, and vending machine will spue commodity.Apply this technology and carry out exchanges data.Effectively can reduce hardware cost based on this technology, the cost of sound wave repacking is very low, and Scaledeployment is had opportunity; In addition, sound wave security performance is better, and effective time is low, even if intercepted also useless by people,
Product side, wireless routing can be disposed sound wave and pay hardware, wireless network password is set by software programming, user can can't see password, when needs are surfed the Net time, mobile phone moves near router and carries out exchanges data by sound wave by user, thus obtains password.At set intervals, program will automatic more new password again.When user needs to continue online, will again sound wave payment function be used to obtain password near router mobile phone.The behavior of rubbing net can be stopped like this.
As shown in Figure 3, be system architecture schematic diagram, wherein ringlet is the scope signal of the effective communication distance of ultrasonic wireless communication, and great circle is the scope signal of the effective communication distance of WIFI; What be positioned at message center region is router, and terminal equipment can have and is much not limited to shown in Fig. 3, and in figure 3, A terminal equipment can obtain password, B due to outside the efficient communication scope of ultrasonic wireless communication so cannot password be obtained.
At equipment side, working-flow is as follows:
Dispose sound wave chip on the router; Programming makes router can send the password of wireless network, and password can be a string random character, and just change automatically at set intervals.
When user wants access network, sound wave is used to carry out password exchange near router, by access network after certification.
After user connects a period of time, router can change the password of wireless network at set intervals, repeats verification process.Such as just automatically change password every ten minutes programs, wanting to continue online just needs to use mobile phone to use sound wave to carry out exchanges data near router to obtain password and can continue online.
Working-flow as shown in Figure 4, comprises the steps:
401: after router startup, generate random character password;
402: mobile phone, near above-mentioned router, exchanges above-mentioned character password with the communication mode of ultrasonic wireless communication and router communication;
403: determine whether successfully switch character password, if so, enter 405, otherwise enter 404;
404: determine wireless network connection failure, again can enter 402;
405: use above-mentioned character password access of radio network (WIFI network);
406: after a period of time, above-mentioned character password lost efficacy, and again entered 402; If do not enter 402, then enter 407;
407: router determines that above-mentioned mobile phone connects time-out, disconnects the wireless connections between mobile phone.
In embodiments of the present invention, use the mode that ultrasonic wireless communicates, therefore correspondence uses ultrasonic wave hardware, other near-field communications (NFC can also be used, NearFieldCommunication) therefore mode also can use NFC chip to replace ultrasonic wave hardware, then can be reached the effect sending random string at set intervals and replace wireless network password equally by programming.
The embodiment of the present invention additionally provides a kind of router, as shown in Figure 5, comprising:
First communication unit 501, launches verify data for using the first communication;
Receiving element 502, for receiving the access request of carrying verify data from terminal equipment;
Authentication ' unit 503, carries out certification for using the verify data of transmitting to the verify data in above-mentioned authentication request;
Access control unit 504, if for authentification failure, then refuses access, if certification is passed through, then allows above-mentioned terminal equipment to access;
Second communication unit 505, for using the second communication to carry out data interaction with above-mentioned terminal equipment after above-mentioned terminal equipment access; Above-mentioned first communication effective communication distance is less than the effective communication distance of above-mentioned second communication.
Have radio communication function by known its of the function of router, the router in the present embodiment can be wireless router, also can be to have wired and router that is radio communication function concurrently." first " and " second " is to distinguish two kinds of different communications, does not have the implication that other technologies limit.Verify data is the data for carrying out authentication, can be password usually, and can be that other have the data of authentication function, its concrete manifestation form affect the realization of the embodiment of the present invention yet, and therefore the embodiment of the present invention does not do uniqueness restriction to this.
In the present embodiment, can carry verify data in access request, this verify data may be the verify data that router is launched, and also may not be the verify data that router is launched, need subsequent authentication to confirm.Even the verify data that router is launched, also stylistic difference can be had, illustrate: the verify data that router is launched can be: encryption head+authentication password, access request can only comprise above-mentioned authentication password, also can comprise above-mentioned complete: encryption head+authentication password.Here terminal equipment can be mobile terminal, also can be the terminal of desktop computer and so on, as long as the terminal of wireless access can be used all to be fine in theory.It is more common that mobile terminal rubs net, and in fact desktop computer rubs the application scenarios of net also very generally, the WIF etc. that the WIFI of Stall businessman rubs in resident family, the user in next door rubs neighbours of such as second floor.
The most common way of certification is comparison, and in such cases, if what comprise in verify data is authentication password, so verification process can be whether the authentication password that comparison is launched is consistent with the authentication password received.Authentication password also can and incomplete same but meet predetermined rule, such as: specify in verify data and need the authentication password returned to be the authentication password of authentication password after a certain calculating launched, be all fine.The conversion process of authentication password and concrete verification process, those skilled in the art can select arbitrarily, do not do uniqueness limit this embodiment of the present invention.
In above embodiment, because above-mentioned first communication effective communication distance is less than the effective communication distance of above-mentioned second communication, the first communication is used to launch password to terminal equipment, the second communication is used to carry out data interaction, terminal ability access authentication data so only in more among a small circle, prevent from being in (terminal equipment normally outside horizon range) access authentication data in a big way, thus prevent this part terminal equipment from illegally accessing.
As a rule, the terminal equipment distance of rubbing net can be distant not near network ownership, if the effective communication distance of the first communication is closer, such as: only have Centimeter Level or decimeter grade, so rub network users and cannot obtain router password beyond network ownership's horizon range.
The embodiment of the present invention additionally provides the concrete send mode of two kinds of verify datas, specific as follows:
One, above-mentioned first communication unit 501, for taking predetermined time as interval, periodically uses the verify data of the first communication broadcast stochastic generation.
The present embodiment adopts the mode of periodic transmission random authentication data, ceaselessly can convert verify data, significantly increases the difficulty that verify data is cracked.The mode of this conversion verify data is completed automatically by router, does not need artificial setting, therefore uses difficulty very low.
Two, above-mentioned first communication unit 501, also for before use first communication transmitting verify data, receives the verify data using the first communication to send from terminal equipment and obtains request;
Above-mentioned first communication unit 501, launches verify data for using the first communication and comprises: use the first communication to send the verify data of holding for the purpose of above-mentioned terminal equipment to above-mentioned terminal equipment.
Front a kind of implementation realizes with the forms of broadcasting, the destination that the transmission of verify data is not fixed; The mode of response type replys verify data that what the present embodiment then adopted is realizes.In actual applications, verify data can be avoided too much to be sent cause easily by the risk intercepted.
The embodiment of the present invention additionally provides the optional implementation of the first communication, it should be noted that, as long as to be less than the effective communication distance of the second communication just passable for the first communication effective communication distance in theory, be not limited in following citing, therefore following citing should not be construed as possible preferred implementation and limits the uniqueness of the embodiment of the present invention, specific as follows: above-mentioned first communication comprises: ultrasonic wireless communication or near-field communication.
The embodiment of the present invention additionally provides the optional implementation of the second communication, it should be noted that, as long as to be greater than the effective communication distance of the first communication just passable for the second communication effective communication distance in theory, be not limited in following citing, therefore following citing should not be construed as possible preferred implementation and limits the uniqueness of the embodiment of the present invention, specific as follows: above-mentioned second communication comprises: Wireless Fidelity.
The embodiment of the present invention additionally provides a kind of terminal equipment, as shown in Figure 6, comprising:
First communication unit 601, for using the first communication reception from the verify data of router;
Transmitting element 602, for sending the access request of carrying above-mentioned verify data to above-mentioned router;
Access unit 603, for after certification is passed through, accesses above-mentioned router;
Second communication unit 604, for after the above-mentioned router of access, uses the second communication to carry out data interaction with above-mentioned router; Above-mentioned first communication effective communication distance is less than the effective communication distance of above-mentioned second communication.
By the function of router and terminal equipment known both all there is radio communication function, the router in the present embodiment can be wireless router, and terminal equipment can comprise any terminal equipment of mobile phone.Verify data is the data for carrying out authentication, can be password usually, and can be that other have the data of authentication function, its concrete manifestation form affect the realization of the embodiment of the present invention yet, and therefore the embodiment of the present invention does not do uniqueness restriction to this.Above-mentioned verify data can be broadcast also can be the verify data having destination, two kinds of modes all do not affect the realization of the embodiment of the present invention.
In the present embodiment, can carry verify data in access request, this verify data may be the verify data that router is launched, and also may be the verify data after the verify data conversion of router transmitting, need subsequent authentication to confirm.Even the verify data that router is launched, also stylistic difference can be had, illustrate: the verify data that router is launched can be: encryption head+authentication password, access request can only comprise above-mentioned authentication password, also can comprise above-mentioned complete: encryption head+authentication password.
In above embodiment, because above-mentioned first communication effective communication distance is less than the effective communication distance of above-mentioned second communication, the first communication is used to launch password to terminal equipment, the second communication is used to carry out data interaction, terminal ability access authentication data so only in more among a small circle, prevent from being in (terminal equipment normally outside horizon range) access authentication data in a big way, thus prevent this part terminal equipment from illegally accessing.
As a rule, the terminal equipment distance of rubbing net can be distant not near network ownership, if the effective communication distance of the first communication is closer, such as: only have Centimeter Level or decimeter grade, so rub network users and cannot obtain router password beyond network ownership's horizon range.
The embodiment of the present invention additionally provides the concrete receive mode of two kinds of verify datas, specific as follows:
One, above-mentioned first communication unit 601, receiving above-mentioned router with predetermined time for using the first communication is interval, the verify data of the stochastic generation of periodically broadcast.
The present embodiment adopts the mode of periodic transmission random authentication data, ceaselessly can convert verify data, significantly increases the difficulty that verify data is cracked.The mode of this conversion verify data is completed automatically by router, does not need artificial setting, therefore uses difficulty very low.
Two, above-mentioned first communication unit 601, before receiving the verify data from router at use first communication, uses the first communication to send card data acquisition request to router;
First communication unit 601, comprises for the verify data using the first communication to receive from router: receive above-mentioned router and use the first communication to be the verify data of above-mentioned terminal equipment to the destination that above-mentioned terminal equipment sends.
Front a kind of implementation realizes with the forms of broadcasting, the destination that the transmission of verify data is not fixed; The mode of response type replys verify data that what the present embodiment then adopted is realizes.In actual applications, verify data can be avoided too much to be sent cause easily by the risk intercepted.
The embodiment of the present invention additionally provides a kind of router, as shown in Figure 7, comprising: receiver 701, reflector 702, processor 703 and memory 704;
Wherein, above-mentioned processor 703 performs for controlling: use the first communication to launch verify data; Receive the access request of carrying verify data from terminal equipment; The verify data of launching is used to carry out certification to the verify data in above-mentioned authentication request, if authentification failure, then refuse access, if certification is passed through, then allow above-mentioned terminal equipment to access, after above-mentioned terminal equipment access, use the second communication to carry out data interaction with above-mentioned terminal equipment; Above-mentioned first communication effective communication distance is less than the effective communication distance of above-mentioned second communication.
In above embodiment, because above-mentioned first communication effective communication distance is less than the effective communication distance of above-mentioned second communication, the first communication is used to launch password to terminal equipment, the second communication is used to carry out data interaction, terminal ability access authentication data so only in more among a small circle, prevent from being in (terminal equipment normally outside horizon range) access authentication data in a big way, thus prevent this part terminal equipment from illegally accessing.
As a rule, the terminal equipment distance of rubbing net can be distant not near network ownership, if the effective communication distance of the first communication is closer, such as: only have Centimeter Level or decimeter grade, so rub network users and cannot obtain router password beyond network ownership's horizon range.
The embodiment of the present invention additionally provides the concrete send mode of two kinds of verify datas, specific as follows:
One, above-mentioned processor 703 performs for controlling: use the first communication to launch verify data and comprise: take predetermined time as interval, periodically uses the verify data of the first communication broadcast stochastic generation.
The present embodiment adopts the mode of periodic transmission random authentication data, ceaselessly can convert verify data, significantly increases the difficulty that verify data is cracked.The mode of this conversion verify data is completed automatically by router, does not need artificial setting, therefore uses difficulty very low.
Two, perform for controlling at above-mentioned processor 703: before using the first communication transmitting verify data, also comprise: receive the verify data using the first communication to send from terminal equipment and obtain request;
Above-mentioned processor 703 performs for controlling: use the first communication to launch verify data and comprise: use the first communication to send the verify data of holding for the purpose of above-mentioned terminal equipment to above-mentioned terminal equipment.
Front a kind of implementation realizes with the forms of broadcasting, the destination that the transmission of verify data is not fixed; The mode of response type replys verify data that what the present embodiment then adopted is realizes.In actual applications, verify data can be avoided too much to be sent cause easily by the risk intercepted.
In the embodiment above, according to periodically generating verify data, after terminal equipment access network, needing to use new verify data certification again, if authentification failure will suspension, if authentication success, can access state be kept.In actual use, the user of terminal equipment may be needed, need again to enter within the scope of the efficient communication of the first communication, therefore the embodiment of the present invention can have another mode, that is: after above-mentioned wireless terminal has accessed, the second communication is used to send the verify data of stochastic generation to the terminal equipment accessed.Subsequent authentication procedure can not repeat them here with reference to conventional identifying procedure.In addition, also can set, use the second communication to send the time of the verify data of stochastic generation, such as: one hour, or two hours; This time can be determined as required, after the setting of this time, again entering within the scope of the first communication coverage and regaining verify data, namely regaining mandate by needing the user of terminal equipment at this moment.
The embodiment of the present invention additionally provides the optional implementation of the first communication, it should be noted that, as long as to be less than the effective communication distance of the second communication just passable for the first communication effective communication distance in theory, be not limited in following citing, therefore following citing should not be construed as possible preferred implementation and limits the uniqueness of the embodiment of the present invention, specific as follows: above-mentioned first communication comprises: ultrasonic wireless communication or near-field communication.
The embodiment of the present invention additionally provides the optional implementation of the second communication, it should be noted that, as long as to be greater than the effective communication distance of the first communication just passable for the second communication effective communication distance in theory, be not limited in following citing, therefore following citing should not be construed as possible preferred implementation and limits the uniqueness of the embodiment of the present invention, specific as follows: above-mentioned second communication comprises: Wireless Fidelity.
The embodiment of the present invention additionally provides another kind of terminal equipment, as shown in Figure 8, comprising: receiver 801, reflector 802, processor 803 and memory 804;
Wherein, above-mentioned processor 803 performs for controlling: use the first communication reception from the verify data of router; The access request of carrying above-mentioned verify data is sent to above-mentioned router; After certification is passed through, access above-mentioned router, then use the second communication to carry out data interaction with above-mentioned router; Above-mentioned first communication effective communication distance is less than the effective communication distance of above-mentioned second communication.
In above embodiment, because above-mentioned first communication effective communication distance is less than the effective communication distance of above-mentioned second communication, the first communication is used to launch password to terminal equipment, the second communication is used to carry out data interaction, terminal ability access authentication data so only in more among a small circle, prevent from being in (terminal equipment normally outside horizon range) access authentication data in a big way, thus prevent this part terminal equipment from illegally accessing.
As a rule, the terminal equipment distance of rubbing net can be distant not near network ownership, if the effective communication distance of the first communication is closer, such as: only have Centimeter Level or decimeter grade, so rub network users and cannot obtain router password beyond network ownership's horizon range.
The embodiment of the present invention additionally provides the concrete receive mode of two kinds of verify datas, specific as follows:
One, above-mentioned processor 803 performs for controlling: the verify data using the first communication to receive from router comprises: using the first communication to receive above-mentioned router with predetermined time is interval, the verify data of the stochastic generation of periodically broadcast.
The present embodiment adopts the mode of periodic transmission random authentication data, ceaselessly can convert verify data, significantly increases the difficulty that verify data is cracked.The mode of this conversion verify data is completed automatically by router, does not need artificial setting, therefore uses difficulty very low.
Two, perform for controlling at above-mentioned processor 803: before the verify data using the first communication to receive from router, also comprise: use the first communication to send card data acquisition request to router;
Above-mentioned processor 803 performs for controlling: the verify data using the first communication to receive from router comprises: receive above-mentioned router and use the first communication to be the verify data of above-mentioned terminal equipment to the destination that above-mentioned terminal equipment sends.
Front a kind of implementation realizes with the forms of broadcasting, the destination that the transmission of verify data is not fixed; The mode of response type replys verify data that what the present embodiment then adopted is realizes.In actual applications, verify data can be avoided too much to be sent cause easily by the risk intercepted.
The embodiment of the present invention additionally provides another kind of mobile phone, and as a citing of terminal equipment, as shown in Figure 9, for convenience of explanation, illustrate only the part relevant to the embodiment of the present invention, concrete ins and outs do not disclose, and please refer to embodiment of the present invention method part.Terminal equipment in the embodiment of the present invention can for comprising mobile phone, panel computer, PDA (PersonalDigitalAssistant, personal digital assistant), POS (PointofSales, point-of-sale terminal), the terminal equipment arbitrarily such as vehicle-mounted computer, take terminal equipment as mobile phone be example:
Shown in Fig. 9 is the block diagram of the part-structure of the mobile phone relevant to the terminal that the embodiment of the present invention provides.With reference to figure 9, mobile phone comprises: radio frequency (RadioFrequency, RF) parts such as circuit 910, memory 920, input unit 930, display unit 940, transducer 950, voicefrequency circuit 960, Wireless Fidelity (wirelessfidelity, WiFi) module 970, processor 980 and power supply 990.It will be understood by those skilled in the art that the handset structure shown in Fig. 9 does not form the restriction to mobile phone, the parts more more or less than diagram can be comprised, or combine some parts, or different parts are arranged.
Concrete introduction is carried out below in conjunction with Fig. 9 each component parts to mobile phone:
RF circuit 910 can be used for receiving and sending messages or in communication process, the reception of signal and transmission, especially, after being received by the downlink information of base station, process to processor 980; In addition, the up data of design are sent to base station.Usually, RF circuit 910 includes but not limited to antenna, at least one amplifier, transceiver, coupler, low noise amplifier (LowNoiseAmplifier, LNA), duplexer etc.In addition, RF circuit 910 can also by radio communication and network and other devices communicatings.Above-mentioned radio communication can use arbitrary communication standard or agreement, include but not limited to global system for mobile communications (GlobalSystemofMobilecommunication, GSM), general packet radio service (GeneralPacketRadioService, GPRS), code division multiple access (CodeDivisionMultipleAccess, CDMA), Wideband Code Division Multiple Access (WCDMA) (WidebandCodeDivisionMultipleAccess, WCDMA), Long Term Evolution (LongTermEvolution, LTE), Email, Short Message Service (ShortMessagingService, SMS) etc.
Memory 920 can be used for storing software program and module, and processor 980 is stored in software program and the module of memory 920 by running, thus performs various function application and the data processing of mobile phone.Memory 920 mainly can comprise storage program district and store data field, and wherein, storage program district can storage operation system, application program (such as sound-playing function, image player function etc.) etc. needed at least one function; Store data field and can store the data (such as voice data, phone directory etc.) etc. created according to the use of mobile phone.In addition, memory 920 can comprise high-speed random access memory, can also comprise nonvolatile memory, such as at least one disk memory, flush memory device or other volatile solid-state parts.
Input unit 930 can be used for the numeral or the character information that receive input, and generation arranges with the user of mobile phone and function controls the input of relevant key signals.Particularly, input unit 930 can comprise contact panel 931 and other input equipments 932.Contact panel 931, also referred to as touch-screen, user can be collected or neighbouring touch operation (such as user uses any applicable object or the operations of annex on contact panel 931 or near contact panel 931 such as finger, stylus) thereon, and drive corresponding jockey according to the formula preset.Optionally, contact panel 931 can comprise touch detecting apparatus and touch controller two parts.Wherein, touch detecting apparatus detects the touch orientation of user, and detects the signal that touch operation brings, and sends signal to touch controller; Touch controller receives touch information from touch detecting apparatus, and converts it to contact coordinate, then gives processor 980, and the order that energy receiving processor 980 is sent also is performed.In addition, the polytypes such as resistance-type, condenser type, infrared ray and surface acoustic wave can be adopted to realize contact panel 931.Except contact panel 931, input unit 930 can also comprise other input equipments 932.Particularly, other input equipments 932 can include but not limited to one or more in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
Display unit 940 can be used for the various menus showing information or the information being supplied to user and the mobile phone inputted by user.Display unit 940 can comprise display floater 941, optionally, the form such as liquid crystal display (LiquidCrystalDisplay, LCD), Organic Light Emitting Diode (OrganicLight-EmittingDiode, OLED) can be adopted to configure display floater 941.Further, contact panel 931 can cover display floater 941, when contact panel 931 detects thereon or after neighbouring touch operation, send processor 980 to determine the type of touch event, on display floater 941, provide corresponding vision to export with preprocessor 980 according to the type of touch event.Although in fig .9, contact panel 931 and display floater 941 be as two independently parts to realize input and the input function of mobile phone, but in certain embodiments, can by integrated to contact panel 931 and display floater 941 and realize the input and output function of mobile phone.
Mobile phone also can comprise at least one transducer 950, such as optical sensor, motion sensor and other transducers.Particularly, optical sensor can comprise ambient light sensor and proximity transducer, and wherein, ambient light sensor the light and shade of environmentally light can regulate the brightness of display floater 941, proximity transducer when mobile phone moves in one's ear, can cut out display floater 941 and/or backlight.As the one of motion sensor, accelerometer sensor can detect the size of all directions (are generally three axles) acceleration, size and the direction of gravity can be detected time static, can be used for identifying the application (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating) of mobile phone attitude, Vibration identification correlation function (such as pedometer, knock) etc.; As for mobile phone also other transducers such as configurable gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, do not repeat them here.
Voicefrequency circuit 960, loud speaker 961, microphone 962 can provide the audio interface between user and mobile phone.Voicefrequency circuit 960 can by receive voice data conversion after the signal of telecommunication, be transferred to loud speaker 961, by loud speaker 961 be converted to voice signal export; On the other hand, the voice signal of collection is converted to the signal of telecommunication by microphone 962, voice data is converted to after being received by voicefrequency circuit 960, after again voice data output processor 980 being processed, through RF circuit 910 to send to such as another mobile phone, or export voice data to memory 920 to process further.
WiFi belongs to short range wireless transmission technology, and by WiFi module 970, mobile phone can help that user sends and receive e-mail, browsing page and access streaming video etc., and its broadband internet wireless for user provides is accessed.Although Fig. 9 shows WiFi module 970, be understandable that, it does not belong to must forming of mobile phone, can omit in the scope of essence not changing invention as required completely.
Processor 980 is control centres of mobile phone, utilize the various piece of various interface and the whole mobile phone of connection, software program in memory 920 and/or module is stored in by running or performing, and call the data be stored in memory 920, perform various function and the deal with data of mobile phone, thus integral monitoring is carried out to mobile phone.Optionally, processor 980 can comprise one or more processing unit; Preferably, processor 980 accessible site application processor and modem processor, wherein, application processor mainly processes operating system, user interface and application program etc., and modem processor mainly processes radio communication.Be understandable that, above-mentioned modem processor also can not be integrated in processor 980.
Mobile phone also comprises the power supply 990 (such as battery) of powering to all parts, preferably, power supply can be connected with processor 980 logic by power-supply management system, thus realizes the functions such as management charging, electric discharge and power managed by power-supply management system.
Although not shown, mobile phone can also comprise camera, bluetooth module etc., does not repeat them here.
In embodiments of the present invention, the processor 980 included by this terminal also has the function controlling to perform above method flow.Above method flow then can realize based on the hardware configuration shown in Fig. 9.
It should be noted that in above-mentioned router and terminal equipment embodiment, included unit is carry out dividing according to function logic, but is not limited to above-mentioned division, as long as can realize corresponding function; In addition, the concrete title of each functional unit, also just for the ease of mutual differentiation, is not limited to protection scope of the present invention.
In addition, one of ordinary skill in the art will appreciate that all or part of step realized in above-mentioned each embodiment of the method is that the hardware that can carry out instruction relevant by program completes, corresponding program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium mentioned can be read-only memory, disk or CD etc.
These are only the present invention's preferably embodiment; but protection scope of the present invention is not limited thereto; anyly be familiar with those skilled in the art in the technical scope that the embodiment of the present invention discloses, the change that can expect easily or replacement, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claim.

Claims (16)

1. a connection control method, is characterized in that, comprising:
Router uses the first communication to launch verify data;
Described router receives the access request of carrying verify data from terminal equipment;
Described router uses the verify data of launching to carry out certification to the verify data in described authentication request, if authentification failure, then refuse access, if certification is passed through, then allow described terminal equipment to access, after described terminal equipment access, use the second communication to carry out data interaction with described terminal equipment; Described first communication effective communication distance is less than the effective communication distance of described second communication.
2. method according to claim 1, is characterized in that, described router uses the first communication to launch verify data to comprise:
Router take predetermined time as interval, periodically uses the verify data of the first communication broadcast stochastic generation.
3. method according to claim 1, is characterized in that, uses before the first communication launches verify data, also comprise at described router:
Router receives the verify data using the first communication to send from terminal equipment and obtains request;
Described router uses the first communication transmitting verify data to comprise:
Described router uses the first communication to send the verify data of holding for the purpose of described terminal equipment to described terminal equipment.
4. method according to claims 1 to 3 any one, is characterized in that,
Described first communication comprises: ultrasonic wireless communication or near-field communication.
5. method according to claims 1 to 3 any one, is characterized in that,
Described second communication comprises: Wireless Fidelity.
6. a connection control method, is characterized in that, comprising:
Terminal equipment uses the first communication reception from the verify data of router;
Described terminal equipment sends the access request of carrying described verify data to described router;
Described terminal equipment, after certification is passed through, accesses described router, then uses the second communication to carry out data interaction with described router; Described first communication effective communication distance is less than the effective communication distance of described second communication.
7. method according to claim 6, is characterized in that, the verify data that described terminal equipment uses the first communication to receive from router comprises:
It take predetermined time as interval that terminal equipment uses the first communication to receive described router, the verify data of the stochastic generation of periodically broadcast.
8. method according to claim 6, is characterized in that, before the verify data that described terminal equipment uses the first communication to receive from router, also comprises:
Terminal equipment uses the first communication to send card data acquisition request to router;
The verify data that described terminal equipment uses the first communication to receive from router comprises:
Described terminal equipment receives described router and uses the first communication to be the verify data of described terminal equipment to the destination that described terminal equipment sends.
9. a router, is characterized in that, comprising:
First communication unit, launches verify data for using the first communication;
Receiving element, for receiving the access request of carrying verify data from terminal equipment;
Authentication ' unit, carries out certification for using the verify data of transmitting to the verify data in described authentication request;
Access control unit, if for authentification failure, then refuses access, if certification is passed through, then allows described terminal equipment to access;
Second communication unit, for using the second communication to carry out data interaction with described terminal equipment after described terminal equipment access; Described first communication effective communication distance is less than the effective communication distance of described second communication.
10. router according to claim 9, is characterized in that,
Described first communication unit, for taking predetermined time as interval, periodically uses the verify data of the first communication broadcast stochastic generation.
11. routers according to claim 9, is characterized in that,
Described first communication unit, also for before use first communication transmitting verify data, receives the verify data using the first communication to send from terminal equipment and obtains request;
Described first communication unit, launches verify data for using the first communication and comprises: use the first communication to send the verify data of holding for the purpose of described terminal equipment to described terminal equipment.
12. according to claims 1 to 3 any one router, it is characterized in that,
Described first communication comprises: ultrasonic wireless communication or near-field communication.
13. according to claims 1 to 3 any one router, it is characterized in that,
Described second communication comprises: Wireless Fidelity.
14. 1 kinds of terminal equipments, is characterized in that, comprising:
First communication unit, for using the first communication reception from the verify data of router;
Transmitting element, for sending the access request of carrying described verify data to described router;
Access unit, for after certification is passed through, accesses described router;
Second communication unit, for after the described router of access, uses the second communication to carry out data interaction with described router; Described first communication effective communication distance is less than the effective communication distance of described second communication.
15., according to terminal equipment described in claim 14, is characterized in that,
Described first communication unit, receiving described router with predetermined time for using the first communication is interval, the verify data of the stochastic generation of periodically broadcast.
16., according to terminal equipment described in claim 14, is characterized in that,
Described first communication unit, before receiving the verify data from router at use first communication, uses the first communication to send card data acquisition request to router;
First communication unit, comprises for the verify data using the first communication to receive from router: receive described router and use the first communication to be the verify data of described terminal equipment to the destination that described terminal equipment sends.
CN201510481880.3A 2015-08-03 2015-08-03 Access control method, router and terminal equipment Pending CN105142202A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510481880.3A CN105142202A (en) 2015-08-03 2015-08-03 Access control method, router and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510481880.3A CN105142202A (en) 2015-08-03 2015-08-03 Access control method, router and terminal equipment

Publications (1)

Publication Number Publication Date
CN105142202A true CN105142202A (en) 2015-12-09

Family

ID=54727376

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510481880.3A Pending CN105142202A (en) 2015-08-03 2015-08-03 Access control method, router and terminal equipment

Country Status (1)

Country Link
CN (1) CN105142202A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107872799A (en) * 2016-09-26 2018-04-03 通用汽车有限责任公司 The ultrasonic audio transmission of WLAN information
CN107948164A (en) * 2017-11-29 2018-04-20 中国科学院数据与通信保护研究教育中心 The Wi Fi passwords dynamic updating methods and system of a kind of combination physics authentication factor
CN115499897A (en) * 2022-11-16 2022-12-20 荣耀终端有限公司 WiFi network access method and related device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102355308A (en) * 2011-06-24 2012-02-15 软库创投(北京)科技有限公司 Information transmission method, receiving method and terminal equipment
CN103874164A (en) * 2014-02-28 2014-06-18 齐文钊 Method and system for connecting to WIFI (Wireless Fidelity) by NFC (Near Field Communication) and mobile terminal equipment
CN103987038A (en) * 2013-02-07 2014-08-13 深圳市快播科技有限公司 Radio communication method and system
CN104113934A (en) * 2014-07-25 2014-10-22 北京奇虎科技有限公司 Router accessing method for communication equipment and accessing system
JP2014215802A (en) * 2013-04-25 2014-11-17 ビッグローブ株式会社 Mobile network connection system, and mobile network connection method
CN104158597A (en) * 2014-07-23 2014-11-19 深圳市揽胜科技有限公司 Method and system for configuring WIFI network product to be connected to router
CN104301116A (en) * 2014-10-23 2015-01-21 上海斐讯数据通信技术有限公司 Method and system of private authentication mode of NFC wireless router

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102355308A (en) * 2011-06-24 2012-02-15 软库创投(北京)科技有限公司 Information transmission method, receiving method and terminal equipment
CN103987038A (en) * 2013-02-07 2014-08-13 深圳市快播科技有限公司 Radio communication method and system
JP2014215802A (en) * 2013-04-25 2014-11-17 ビッグローブ株式会社 Mobile network connection system, and mobile network connection method
CN103874164A (en) * 2014-02-28 2014-06-18 齐文钊 Method and system for connecting to WIFI (Wireless Fidelity) by NFC (Near Field Communication) and mobile terminal equipment
CN104158597A (en) * 2014-07-23 2014-11-19 深圳市揽胜科技有限公司 Method and system for configuring WIFI network product to be connected to router
CN104113934A (en) * 2014-07-25 2014-10-22 北京奇虎科技有限公司 Router accessing method for communication equipment and accessing system
CN104301116A (en) * 2014-10-23 2015-01-21 上海斐讯数据通信技术有限公司 Method and system of private authentication mode of NFC wireless router

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107872799A (en) * 2016-09-26 2018-04-03 通用汽车有限责任公司 The ultrasonic audio transmission of WLAN information
CN107948164A (en) * 2017-11-29 2018-04-20 中国科学院数据与通信保护研究教育中心 The Wi Fi passwords dynamic updating methods and system of a kind of combination physics authentication factor
CN107948164B (en) * 2017-11-29 2021-04-20 中国科学院数据与通信保护研究教育中心 Wi-Fi password dynamic updating method and system combining physical authentication factors
CN115499897A (en) * 2022-11-16 2022-12-20 荣耀终端有限公司 WiFi network access method and related device

Similar Documents

Publication Publication Date Title
CN103729765B (en) A kind of authentication control method, terminal, server, terminal device and system
CN103929796B (en) The method and device of shared access point
CN103475996A (en) Network connecting method, network sharing method and devices
CN104468464A (en) Authentication method, device and system
CN103458408A (en) Network connection method and network sharing method and device
CN103731810A (en) Access point sharing method and device
CN103458409A (en) Network connection method and network sharing method and device
CN104065634B (en) Online game steal-number processing method and system
CN104796385A (en) Terminal binding method, device and system
CN104618873A (en) Method and device for sharing access point information
CN103634109A (en) Operation right authentication method and device
CN104135728B (en) Method for connecting network and device
CN104618440A (en) Intelligent equipment control method and device
CN104468463A (en) Verification method, verification device and verification system
CN104519197A (en) User login method, user login device and terminal devices
CN103338193B (en) Method, system and device for initial media equipment
CN104093189A (en) Multimedia playing device network initialization method, system, device and terminal
CN103716793A (en) Access point information sharing method and apparatus
CN104580167A (en) Data transmission method, device and system
CN103607713A (en) Method, apparatus, device and system for network access
CN104579658A (en) Identity authentication method and device
CN106550361B (en) Data transmission method, equipment and computer readable storage medium
CN104901806B (en) A kind of virtual resource processing method, device and system
CN104852802A (en) Identity verification method, equipment, and system
CN106534324A (en) Data sharing method and cloud server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20151209